Search dblp for Publications

export results for "stream:streams/journals/cryptologia:"

more than 1000 matches, exporting first 1000 hits only!

 download as .bib file

@article{DBLP:journals/cryptologia/Antal24,
  author       = {Eugen Antal},
  title        = {The origin of military cryptanalysis in Czechoslovakia},
  journal      = {Cryptologia},
  volume       = {48},
  number       = {3},
  pages        = {193--218},
  year         = {2024},
  url          = {https://doi.org/10.1080/01611194.2022.2158448},
  doi          = {10.1080/01611194.2022.2158448},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Antal24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Boersma24,
  author       = {Stuart Boersma},
  title        = {Elizebeth Smith Friedman's recovery of the wiring of two rotors from
                  an enigma {D} machine},
  journal      = {Cryptologia},
  volume       = {48},
  number       = {1},
  pages        = {1--25},
  year         = {2024},
  url          = {https://doi.org/10.1080/01611194.2022.2109944},
  doi          = {10.1080/01611194.2022.2109944},
  timestamp    = {Thu, 25 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Boersma24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Christensen24,
  author       = {Chris Christensen},
  title        = {Review of \emph{100 People You Never Knew Were at Bletchley Park}
                  by Sinclair McKayMcKay, Sinclair. \emph{100 People You Never Knew
                  Were at Bletchley Park} . Safe Haven Books Ltd, London, 2021. 250
                  pages, Hardcover, {\textsterling}14.99. {ISBN} 978-1-8384051-2-0},
  journal      = {Cryptologia},
  volume       = {48},
  number       = {3},
  pages        = {282--284},
  year         = {2024},
  url          = {https://doi.org/10.1080/01611194.2023.2197902},
  doi          = {10.1080/01611194.2023.2197902},
  timestamp    = {Fri, 29 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Christensen24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Christensen24a,
  author       = {Chris Christensen},
  title        = {Review of \emph{No More Secrets: My Part in Codebreaking at Bletchley
                  Park and the Pentagon} by Betty WebbWebb, Betty. \emph{No More Secrets:
                  My Part in codebreaking at Bletchley Park and the Pentagon,} London:
                  Mardle Books. 2023. 212+x pages, Paperback, {\textsterling}9.99. {ISBN}
                  9781837700219},
  journal      = {Cryptologia},
  volume       = {48},
  number       = {3},
  pages        = {285--288},
  year         = {2024},
  url          = {https://doi.org/10.1080/01611194.2023.2246466},
  doi          = {10.1080/01611194.2023.2246466},
  timestamp    = {Fri, 29 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Christensen24a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Dooley24,
  author       = {John F. Dooley},
  title        = {Review of \emph{From the Ground Up} by Betsy Rohaly SmootSmoot, Betsy
                  Rohaly. 2023. \emph{From the Ground Up: American Cryptology during
                  World War I} . Vol. 48. Series {II:} World War I. Ft. George G. Meade,
                  {MD:} National Security Agency, Center for Cryptologic History. https://media.defense.gov/2023/Jan/26/2003150273/-1/-1/0/WWI{\_}BOOK{\_}01192023.PDF
                  Accessed 01 February 2023},
  journal      = {Cryptologia},
  volume       = {48},
  number       = {1},
  pages        = {91--94},
  year         = {2024},
  url          = {https://doi.org/10.1080/01611194.2023.2225514},
  doi          = {10.1080/01611194.2023.2225514},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Dooley24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Dooley24a,
  author       = {John F. Dooley},
  title        = {Review of \emph{The Puzzle Master} by Danielle TrussoniTrussoni, Danielle.
                  2023. \emph{The Puzzle Master} . New York, {NY:} Random House. https://www.randomhousebooks.com/.
                  362 pages, {ISBN} 978-0-593-59529-9. {\textdollar}22.95: Trussoni,
                  Danielle. 2023. \emph{The Puzzle Master} . New York, {NY:} Random
                  House. https://www.randomhousebooks.com/. 362 pages, {ISBN} 978-0-593-59529-9.
                  {\textdollar}22.95},
  journal      = {Cryptologia},
  volume       = {48},
  number       = {1},
  pages        = {95--96},
  year         = {2024},
  url          = {https://doi.org/10.1080/01611194.2023.2267562},
  doi          = {10.1080/01611194.2023.2267562},
  timestamp    = {Thu, 25 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Dooley24a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Killmann24,
  author       = {Wolfgang Killmann},
  title        = {On security aspects of the ciphers {T-310} and {SKS} with approved
                  long-term keys},
  journal      = {Cryptologia},
  volume       = {48},
  number       = {2},
  pages        = {140--172},
  year         = {2024},
  url          = {https://doi.org/10.1080/01611194.2022.2134752},
  doi          = {10.1080/01611194.2022.2134752},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Killmann24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Luengo24,
  author       = {Elena Almaraz Luengo},
  title        = {Statistical tests suites analysis methods. Cryptographic recommendations},
  journal      = {Cryptologia},
  volume       = {48},
  number       = {3},
  pages        = {219--251},
  year         = {2024},
  url          = {https://doi.org/10.1080/01611194.2022.2155093},
  doi          = {10.1080/01611194.2022.2155093},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Luengo24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Marks24,
  author       = {Philip Marks},
  title        = {Review of \emph{Behind the Enigma} by John FerrisFerris, John. \emph{Behind
                  the Enigma. The Authorized History of GCHQ, Britain's Secret Cyber-Intelligence
                  Agency} . Bloomsbury Publishing, New York, NY, 2020. 823 pages, Hardcover,
                  {\textdollar}36. {ISBN} 978-1-63557-465-4},
  journal      = {Cryptologia},
  volume       = {48},
  number       = {3},
  pages        = {252--281},
  year         = {2024},
  url          = {https://doi.org/10.1080/01611194.2022.2156311},
  doi          = {10.1080/01611194.2022.2156311},
  timestamp    = {Fri, 29 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Marks24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/MegyesiTLLKLW24,
  author       = {Be{\'{a}}ta Megyesi and
                  Crina Tudor and
                  Benedek L{\'{a}}ng and
                  Anna Lehofer and
                  Nils Kopal and
                  Karl de Leeuw and
                  Michelle Waldisp{\"{u}}hl},
  title        = {Keys with nomenclatures in the early modern Europe},
  journal      = {Cryptologia},
  volume       = {48},
  number       = {2},
  pages        = {97--139},
  year         = {2024},
  url          = {https://doi.org/10.1080/01611194.2022.2113185},
  doi          = {10.1080/01611194.2022.2113185},
  timestamp    = {Fri, 22 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/MegyesiTLLKLW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/MishraKPO24,
  author       = {P. R. Mishra and
                  Arvind Kumar and
                  Saibal K. Pal and
                  Odelu Ojjela},
  title        = {Bit inclusion test: an enhanced avalanche test for stream ciphers},
  journal      = {Cryptologia},
  volume       = {48},
  number       = {2},
  pages        = {173--192},
  year         = {2024},
  url          = {https://doi.org/10.1080/01611194.2022.2155092},
  doi          = {10.1080/01611194.2022.2155092},
  timestamp    = {Sat, 16 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/MishraKPO24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/OrrBGSPFJR24,
  author       = {Selma Gomez Orr and
                  Cyrus J. Bonyadi and
                  Enis Golaszewski and
                  Alan T. Sherman and
                  Peter A. H. Peterson and
                  Richard Forno and
                  Sydney Johns and
                  Jimmy Rodriguez},
  title        = {Shadow {IT} in higher education: survey and case study for cybersecurity},
  journal      = {Cryptologia},
  volume       = {48},
  number       = {1},
  pages        = {26--90},
  year         = {2024},
  url          = {https://doi.org/10.1080/01611194.2022.2103754},
  doi          = {10.1080/01611194.2022.2103754},
  timestamp    = {Sat, 10 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/OrrBGSPFJR24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/AhmedPM23,
  author       = {Kashif Ahmed and
                  Saibal K. Pal and
                  Radha Mohan},
  title        = {A review of the tropical approach in cryptography},
  journal      = {Cryptologia},
  volume       = {47},
  number       = {1},
  pages        = {63--87},
  year         = {2023},
  url          = {https://doi.org/10.1080/01611194.2021.1994486},
  doi          = {10.1080/01611194.2021.1994486},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/AhmedPM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Anderson23,
  author       = {Patrick D. Anderson},
  title        = {Review of \emph{Crypto Wars - The Fight for Privacy in the Digital
                  Age: {A} Political History of Digital Encryption}},
  journal      = {Cryptologia},
  volume       = {47},
  number       = {3},
  pages        = {285--298},
  year         = {2023},
  url          = {https://doi.org/10.1080/01611194.2021.2002977},
  doi          = {10.1080/01611194.2021.2002977},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Anderson23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/AntalZ23,
  author       = {Eugen Antal and
                  Pavol Zajac},
  title        = {The first Czechoslovak cipher machine},
  journal      = {Cryptologia},
  volume       = {47},
  number       = {3},
  pages        = {239--260},
  year         = {2023},
  url          = {https://doi.org/10.1080/01611194.2021.1998809},
  doi          = {10.1080/01611194.2021.1998809},
  timestamp    = {Fri, 02 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/AntalZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Bauer23,
  author       = {Craig P. Bauer},
  title        = {The new golden age of decipherment},
  journal      = {Cryptologia},
  volume       = {47},
  number       = {2},
  pages        = {97--100},
  year         = {2023},
  url          = {https://doi.org/10.1080/01611194.2023.2170158},
  doi          = {10.1080/01611194.2023.2170158},
  timestamp    = {Tue, 14 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Bauer23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Bingol23,
  author       = {Sedat Bing{\"{o}}l},
  title        = {The changes in Ottoman diplomatic cryptography and its methods during
                  the 19th century {(1811-1877)}},
  journal      = {Cryptologia},
  volume       = {47},
  number       = {6},
  pages        = {541--569},
  year         = {2023},
  url          = {https://doi.org/10.1080/01611194.2022.2092916},
  doi          = {10.1080/01611194.2022.2092916},
  timestamp    = {Fri, 27 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Bingol23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Boersma23,
  author       = {Stuart Boersma},
  title        = {Elizebeth Smith Friedman and one example of a prohibition era encryption
                  system},
  journal      = {Cryptologia},
  volume       = {47},
  number       = {3},
  pages        = {227--238},
  year         = {2023},
  url          = {https://doi.org/10.1080/01611194.2021.2003913},
  doi          = {10.1080/01611194.2021.2003913},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Boersma23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Boersma23a,
  author       = {Stuart Boersma},
  title        = {Complete examples of encryption systems broken by Elizebeth Smith
                  Friedman: 1923-1934},
  journal      = {Cryptologia},
  volume       = {47},
  number       = {5},
  pages        = {397--418},
  year         = {2023},
  url          = {https://doi.org/10.1080/01611194.2021.2023235},
  doi          = {10.1080/01611194.2021.2023235},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Boersma23a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/BoersmaL23,
  author       = {Stuart Boersma and
                  Jean Marie Linhart},
  title        = {Review of \emph{The Woman All Spies Fear} by Amy Butler Greenfield
                  and \emph{Code Breaker, Spy Hunter} by Laurie Wallmark, Illustrated
                  by Brooke Smart},
  journal      = {Cryptologia},
  volume       = {47},
  number       = {1},
  pages        = {88--92},
  year         = {2023},
  url          = {https://doi.org/10.1080/01611194.2022.2134753},
  doi          = {10.1080/01611194.2022.2134753},
  timestamp    = {Sat, 25 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/BoersmaL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Bures23,
  author       = {Kenneth J. Bures},
  title        = {Cracking {PURPLE:} the identification of homologs in the cryptanalysis
                  of the \emph{Angooki Taipu B} cipher machine},
  journal      = {Cryptologia},
  volume       = {47},
  number       = {5},
  pages        = {436--448},
  year         = {2023},
  url          = {https://doi.org/10.1080/01611194.2022.2064200},
  doi          = {10.1080/01611194.2022.2064200},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Bures23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Campanelli23,
  author       = {Leonardo Campanelli},
  title        = {A statistical cryptanalysis of the Beale ciphers},
  journal      = {Cryptologia},
  volume       = {47},
  number       = {5},
  pages        = {466--473},
  year         = {2023},
  url          = {https://doi.org/10.1080/01611194.2022.2116614},
  doi          = {10.1080/01611194.2022.2116614},
  timestamp    = {Thu, 31 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Campanelli23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/ChenNSW23,
  author       = {Zhixiong Chen and
                  Zhihua Niu and
                  Yuqi Sang and
                  Chenhuang Wu},
  title        = {Arithmetic autocorrelation of binary \emph{m}-sequences},
  journal      = {Cryptologia},
  volume       = {47},
  number       = {5},
  pages        = {449--458},
  year         = {2023},
  url          = {https://doi.org/10.1080/01611194.2022.2071116},
  doi          = {10.1080/01611194.2022.2071116},
  timestamp    = {Thu, 31 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/ChenNSW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Christensen23,
  author       = {Chris Christensen},
  title        = {Review of \emph{Codebreaker Girls: {A} Secret Life at Bletchley Park}
                  by Jan Slimming},
  journal      = {Cryptologia},
  volume       = {47},
  number       = {1},
  pages        = {93--96},
  year         = {2023},
  url          = {https://doi.org/10.1080/01611194.2022.2026838},
  doi          = {10.1080/01611194.2022.2026838},
  timestamp    = {Mon, 20 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Christensen23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Christensen23a,
  author       = {Chris Christensen},
  title        = {Review of \emph{The Rohonc Code: Tracing a Historical Riddle} by Benedek
                  L{\'{a}}ng},
  journal      = {Cryptologia},
  volume       = {47},
  number       = {3},
  pages        = {282--284},
  year         = {2023},
  url          = {https://doi.org/10.1080/01611194.2022.2026841},
  doi          = {10.1080/01611194.2022.2026841},
  timestamp    = {Mon, 22 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Christensen23a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Christensen23b,
  author       = {Chris Christensen},
  title        = {Genevieve Grotjan's "great discovery"},
  journal      = {Cryptologia},
  volume       = {47},
  number       = {4},
  pages        = {302--317},
  year         = {2023},
  url          = {https://doi.org/10.1080/01611194.2022.2060052},
  doi          = {10.1080/01611194.2022.2060052},
  timestamp    = {Tue, 22 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Christensen23b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Christensen23c,
  author       = {Chris Christensen},
  title        = {Review of \emph{Parker Hitt: The Father of American Military Cryptology}
                  by Betsy Rohaly Smoot},
  journal      = {Cryptologia},
  volume       = {47},
  number       = {5},
  pages        = {489--492},
  year         = {2023},
  url          = {https://doi.org/10.1080/01611194.2022.2101404},
  doi          = {10.1080/01611194.2022.2101404},
  timestamp    = {Tue, 22 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Christensen23c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Christensen23d,
  author       = {Chris Christensen},
  title        = {Review of \emph{The Secret Life of an American Codebreaker: Codebreaker
                  Girls} by Jan SlimmingSlimming, Jan. \emph{The Secret Life of an American
                  Codebreaker: Codebreaker Girls} , South Yorkshire, England: Pen and
                  Sword Books. 2022. 289 + xii pages, Hardcover, {\textsterling}25 ({\textdollar}34.95).
                  {ISBN} 9781526784155},
  journal      = {Cryptologia},
  volume       = {47},
  number       = {6},
  pages        = {584--587},
  year         = {2023},
  url          = {https://doi.org/10.1080/01611194.2022.2105179},
  doi          = {10.1080/01611194.2022.2105179},
  timestamp    = {Tue, 24 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Christensen23d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Code23,
  author       = {David L{\o}berg Code},
  title        = {Can musical encryption be both? {A} survey of music-based ciphers},
  journal      = {Cryptologia},
  volume       = {47},
  number       = {4},
  pages        = {318--364},
  year         = {2023},
  url          = {https://doi.org/10.1080/01611194.2021.2021565},
  doi          = {10.1080/01611194.2021.2021565},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Code23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Dooley23,
  author       = {John F. Dooley},
  title        = {Review of \emph{The Rose Code by Kate Quinn}},
  journal      = {Cryptologia},
  volume       = {47},
  number       = {4},
  pages        = {393--395},
  year         = {2023},
  url          = {https://doi.org/10.1080/01611194.2022.2043488},
  doi          = {10.1080/01611194.2022.2043488},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Dooley23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Foxon23,
  author       = {Floe Foxon},
  title        = {A treatise on the Rilke cryptogram},
  journal      = {Cryptologia},
  volume       = {47},
  number       = {6},
  pages        = {493--510},
  year         = {2023},
  url          = {https://doi.org/10.1080/01611194.2022.2092784},
  doi          = {10.1080/01611194.2022.2092784},
  timestamp    = {Fri, 27 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Foxon23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Gathen23,
  author       = {Joachim von zur Gathen},
  title        = {Unicity distance of the Zodiac-340 cipher},
  journal      = {Cryptologia},
  volume       = {47},
  number       = {5},
  pages        = {474--488},
  year         = {2023},
  url          = {https://doi.org/10.1080/01611194.2023.2174821},
  doi          = {10.1080/01611194.2023.2174821},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Gathen23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Holden23,
  author       = {Joshua Holden},
  title        = {Resource guide for teaching post-quantum cryptography},
  journal      = {Cryptologia},
  volume       = {47},
  number       = {5},
  pages        = {459--465},
  year         = {2023},
  url          = {https://doi.org/10.1080/01611194.2022.2078077},
  doi          = {10.1080/01611194.2022.2078077},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Holden23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/KumarGG23,
  author       = {Satish Kumar and
                  Indivar Gupta and
                  Ashok Ji Gupta},
  title        = {A study of public key cryptosystems based on quasigroups},
  journal      = {Cryptologia},
  volume       = {47},
  number       = {6},
  pages        = {511--540},
  year         = {2023},
  url          = {https://doi.org/10.1080/01611194.2022.2081824},
  doi          = {10.1080/01611194.2022.2081824},
  timestamp    = {Fri, 27 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/KumarGG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/KumarMO23,
  author       = {Arvind Kumar and
                  P. R. Mishra and
                  Odelu Ojjela},
  title        = {Analysis of rotation and shift based diffusion functions},
  journal      = {Cryptologia},
  volume       = {47},
  number       = {5},
  pages        = {419--435},
  year         = {2023},
  url          = {https://doi.org/10.1080/01611194.2022.2046660},
  doi          = {10.1080/01611194.2022.2046660},
  timestamp    = {Thu, 31 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/KumarMO23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/KumarS23,
  author       = {Santosh Kumar Ravva and
                  Sureddi R. M. Krishna},
  title        = {Cryptanalysis of {RSA} with small difference of primes and two decryption
                  exponents: Jochemsz and May approach},
  journal      = {Cryptologia},
  volume       = {47},
  number       = {6},
  pages        = {570--583},
  year         = {2023},
  url          = {https://doi.org/10.1080/01611194.2022.2109943},
  doi          = {10.1080/01611194.2022.2109943},
  timestamp    = {Mon, 04 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/KumarS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Lasry23,
  author       = {George Lasry},
  title        = {Cracking {SIGABA} in less than 24 hours on a consumer {PC}},
  journal      = {Cryptologia},
  volume       = {47},
  number       = {1},
  pages        = {1--37},
  year         = {2023},
  url          = {https://doi.org/10.1080/01611194.2021.1989522},
  doi          = {10.1080/01611194.2021.1989522},
  timestamp    = {Tue, 28 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Lasry23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Lasry23a,
  author       = {George Lasry},
  title        = {Analysis of a late 19th century french cipher created by Major Josse},
  journal      = {Cryptologia},
  volume       = {47},
  number       = {1},
  pages        = {48--62},
  year         = {2023},
  url          = {https://doi.org/10.1080/01611194.2021.1996484},
  doi          = {10.1080/01611194.2021.1996484},
  timestamp    = {Tue, 28 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Lasry23a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/LasryBT23,
  author       = {George Lasry and
                  Norbert Biermann and
                  Satoshi Tomokiyo},
  title        = {Deciphering Mary Stuart's lost letters from 1578-1584},
  journal      = {Cryptologia},
  volume       = {47},
  number       = {2},
  pages        = {101--202},
  year         = {2023},
  url          = {https://doi.org/10.1080/01611194.2022.2160677},
  doi          = {10.1080/01611194.2022.2160677},
  timestamp    = {Sat, 13 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/LasryBT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/OstwaldW23,
  author       = {Olaf Ostwald and
                  Frode Weierud},
  title        = {Modern cryptanalysis of the \emph{Truppenschl{\"{u}}ssel}},
  journal      = {Cryptologia},
  volume       = {47},
  number       = {3},
  pages        = {261--281},
  year         = {2023},
  url          = {https://doi.org/10.1080/01611194.2021.1998810},
  doi          = {10.1080/01611194.2021.1998810},
  timestamp    = {Fri, 02 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/OstwaldW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Relkin23,
  author       = {Paul W. Relkin},
  title        = {Solving the Olum 2 cipher: a new approach to cryptanalysis of transposition
                  ciphers},
  journal      = {Cryptologia},
  volume       = {47},
  number       = {1},
  pages        = {38--47},
  year         = {2023},
  url          = {https://doi.org/10.1080/01611194.2021.1992686},
  doi          = {10.1080/01611194.2021.1992686},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Relkin23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Sherman23,
  author       = {David Sherman},
  title        = {\emph{The Codebreakers} war: David Kahn, Macmillan, the government,
                  and the making of a cryptologic history masterpiece},
  journal      = {Cryptologia},
  volume       = {47},
  number       = {3},
  pages        = {205--226},
  year         = {2023},
  url          = {https://doi.org/10.1080/01611194.2021.1998808},
  doi          = {10.1080/01611194.2021.1998808},
  timestamp    = {Mon, 22 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Sherman23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Teseleanu23,
  author       = {George Teseleanu},
  title        = {Cryptographic symmetric structures based on quasigroups},
  journal      = {Cryptologia},
  volume       = {47},
  number       = {4},
  pages        = {365--392},
  year         = {2023},
  url          = {https://doi.org/10.1080/01611194.2021.2022035},
  doi          = {10.1080/01611194.2021.2022035},
  timestamp    = {Thu, 31 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Teseleanu23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/BeanLW22,
  author       = {Richard W. Bean and
                  George Lasry and
                  Frode Weierud},
  title        = {Eavesdropping on the Biafra-Lisbon link - breaking historical ciphers
                  from the Biafran war},
  journal      = {Cryptologia},
  volume       = {46},
  number       = {1},
  pages        = {1--66},
  year         = {2022},
  url          = {https://doi.org/10.1080/01611194.2020.1762261},
  doi          = {10.1080/01611194.2020.1762261},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/BeanLW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Bingol22,
  author       = {Sedat Bing{\"{o}}l},
  title        = {Methods for encryption in early 19th-century Ottoman diplomatic correspondence},
  journal      = {Cryptologia},
  volume       = {46},
  number       = {6},
  pages        = {498--524},
  year         = {2022},
  url          = {https://doi.org/10.1080/01611194.2021.1919943},
  doi          = {10.1080/01611194.2021.1919943},
  timestamp    = {Mon, 05 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Bingol22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/BlanchardRSS22,
  author       = {Enka Blanchard and
                  Ryan Robucci and
                  Ted Selker and
                  Alan T. Sherman},
  title        = {Phrase-verified voting: Verifiable low-tech remote boardroom voting:
                  How We Voted on Tenure {\&} Promotion Cases during the Pandemic},
  journal      = {Cryptologia},
  volume       = {46},
  number       = {1},
  pages        = {67--101},
  year         = {2022},
  url          = {https://doi.org/10.1080/01611194.2021.1975324},
  doi          = {10.1080/01611194.2021.1975324},
  timestamp    = {Mon, 05 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/BlanchardRSS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Bonavoglia22,
  author       = {Paolo Bonavoglia},
  title        = {The ciphers of the Republic of Venice an overview},
  journal      = {Cryptologia},
  volume       = {46},
  number       = {4},
  pages        = {323--346},
  year         = {2022},
  url          = {https://doi.org/10.1080/01611194.2021.1901797},
  doi          = {10.1080/01611194.2021.1901797},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Bonavoglia22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Bouchaudy22,
  author       = {Jean{-}Fran{\c{c}}ois Bouchaudy},
  title        = {Enigma, the {XYZ} period {(1939-1940)}},
  journal      = {Cryptologia},
  volume       = {46},
  number       = {3},
  pages        = {195--271},
  year         = {2022},
  url          = {https://doi.org/10.1080/01611194.2020.1864681},
  doi          = {10.1080/01611194.2020.1864681},
  timestamp    = {Mon, 05 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Bouchaudy22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/ChauhanGMV22,
  author       = {Dimpy Chauhan and
                  Indivar Gupta and
                  Prasanna Raghaw Mishra and
                  Rashmi Verma},
  title        = {Construction of cryptographically strong S-boxes from ternary quasigroups
                  of order 4},
  journal      = {Cryptologia},
  volume       = {46},
  number       = {6},
  pages        = {525--551},
  year         = {2022},
  url          = {https://doi.org/10.1080/01611194.2021.1934915},
  doi          = {10.1080/01611194.2021.1934915},
  timestamp    = {Fri, 11 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/ChauhanGMV22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/ChaumYSR22,
  author       = {David Chaum and
                  Mario Yaksetig and
                  Alan T. Sherman and
                  Joeri de Ruiter},
  title        = {{UDM:} Private user discovery with minimal information disclosure},
  journal      = {Cryptologia},
  volume       = {46},
  number       = {4},
  pages        = {347--379},
  year         = {2022},
  url          = {https://doi.org/10.1080/01611194.2021.1911876},
  doi          = {10.1080/01611194.2021.1911876},
  timestamp    = {Mon, 05 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/ChaumYSR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Christensen22,
  author       = {Chris Christensen},
  title        = {Review of \emph{The {U.S.} Navy's On-the-Roof Gang, Volume One, Prelude
                  to War }by Matt Zullo},
  journal      = {Cryptologia},
  volume       = {46},
  number       = {2},
  pages        = {183--184},
  year         = {2022},
  url          = {https://doi.org/10.1080/01611194.2020.1839815},
  doi          = {10.1080/01611194.2020.1839815},
  timestamp    = {Fri, 11 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Christensen22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Christensen22a,
  author       = {Chris Christensen},
  title        = {Review of \emph{One Day in August} by David O'Keefe},
  journal      = {Cryptologia},
  volume       = {46},
  number       = {2},
  pages        = {185--192},
  year         = {2022},
  url          = {https://doi.org/10.1080/01611194.2021.1901798},
  doi          = {10.1080/01611194.2021.1901798},
  timestamp    = {Fri, 11 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Christensen22a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Christensen22b,
  author       = {Chris Christensen},
  title        = {Review of \emph{Geniuses at War: Bletchley Park, Colossus, and the
                  Dawn of the Digital Age} by David A. Price},
  journal      = {Cryptologia},
  volume       = {46},
  number       = {2},
  pages        = {193--194},
  year         = {2022},
  url          = {https://doi.org/10.1080/01611194.2021.1969702},
  doi          = {10.1080/01611194.2021.1969702},
  timestamp    = {Fri, 11 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Christensen22b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Christensen22c,
  author       = {Chris Christensen},
  title        = {Review of \emph{Before Bletchley Park: The Codebreakers of the First
                  World War} by Paul Gannon},
  journal      = {Cryptologia},
  volume       = {46},
  number       = {3},
  pages        = {272--276},
  year         = {2022},
  url          = {https://doi.org/10.1080/01611194.2021.1949760},
  doi          = {10.1080/01611194.2021.1949760},
  timestamp    = {Fri, 11 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Christensen22c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Christensen22d,
  author       = {Chris Christensen},
  title        = {Review of \emph{Backing Bletchley: The Codebreaking Outstations from
                  Eastcote to GCHQ} by Ronald Koorm: Koorm, Ronald},
  journal      = {Cryptologia},
  volume       = {46},
  number       = {3},
  pages        = {277--279},
  year         = {2022},
  url          = {https://doi.org/10.1080/01611194.2021.1969705},
  doi          = {10.1080/01611194.2021.1969705},
  timestamp    = {Fri, 11 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Christensen22d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Christensen22e,
  author       = {Chris Christensen},
  title        = {Review of \emph{Madame {X:} The Story of '003', the {U.S.} Army Cryptologic
                  Bombe in World War II} by Michael Barbakoff},
  journal      = {Cryptologia},
  volume       = {46},
  number       = {3},
  pages        = {280--283},
  year         = {2022},
  url          = {https://doi.org/10.1080/01611194.2021.1949761},
  doi          = {10.1080/01611194.2021.1949761},
  timestamp    = {Fri, 11 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Christensen22e.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Christensen22f,
  author       = {Chris Christensen},
  title        = {Review of \emph{Images of the National Archives Codebreakers} by Stephen
                  Twigge},
  journal      = {Cryptologia},
  volume       = {46},
  number       = {3},
  pages        = {284--286},
  year         = {2022},
  url          = {https://doi.org/10.1080/01611194.2021.1950077},
  doi          = {10.1080/01611194.2021.1950077},
  timestamp    = {Fri, 11 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Christensen22f.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Christensen22g,
  author       = {Chris Christensen},
  title        = {Review of \emph{Reflections of Alan Turing: {A} Relative Story by
                  Dermot Turing}: Turing, Dermot},
  journal      = {Cryptologia},
  volume       = {46},
  number       = {3},
  pages        = {287--289},
  year         = {2022},
  url          = {https://doi.org/10.1080/01611194.2021.1969703},
  doi          = {10.1080/01611194.2021.1969703},
  timestamp    = {Fri, 11 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Christensen22g.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Christensen22h,
  author       = {Chris Christensen},
  title        = {Review of \emph{USN {\&} {USMC} {WW} {II} Cryptologists' Oral
                  Histories; Voices from the past, Volumes 1 and 2} by {U.S.} Naval
                  Cryptologic Veterans Association},
  journal      = {Cryptologia},
  volume       = {46},
  number       = {4},
  pages        = {380--381},
  year         = {2022},
  url          = {https://doi.org/10.1080/01611194.2021.1969704},
  doi          = {10.1080/01611194.2021.1969704},
  timestamp    = {Fri, 11 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Christensen22h.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Christensen22i,
  author       = {Chris Christensen},
  title        = {Review of \emph{Radio War: The Secret Espionage War of the Radio Security
                  Service 1938-1946} by David Abrutat: Abrutat},
  journal      = {Cryptologia},
  volume       = {46},
  number       = {4},
  pages        = {382--384},
  year         = {2022},
  url          = {https://doi.org/10.1080/01611194.2021.1969706},
  doi          = {10.1080/01611194.2021.1969706},
  timestamp    = {Fri, 11 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Christensen22i.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Christensen22j,
  author       = {Chris Christensen},
  title        = {Review of \emph{The Bombe: The Machine that Defeated Enigma} by Dermot
                  Turing},
  journal      = {Cryptologia},
  volume       = {46},
  number       = {4},
  pages        = {385--386},
  year         = {2022},
  url          = {https://doi.org/10.1080/01611194.2022.2026840},
  doi          = {10.1080/01611194.2022.2026840},
  timestamp    = {Fri, 11 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Christensen22j.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Christensen22k,
  author       = {Chris Christensen},
  title        = {Review of \emph{Eavesdropping on the Emperor: Interrogators and Codebreakers
                  in Britain's War with Japan} by Peter Kornicki},
  journal      = {Cryptologia},
  volume       = {46},
  number       = {6},
  pages        = {552--555},
  year         = {2022},
  url          = {https://doi.org/10.1080/01611194.2022.2026839},
  doi          = {10.1080/01611194.2022.2026839},
  timestamp    = {Fri, 11 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Christensen22k.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/CourtoisG22,
  author       = {Nicolas T. Courtois and
                  Marek Grajek},
  title        = {On latin squares, invariant differentials, random permutations and
                  historical Enigma rotors},
  journal      = {Cryptologia},
  volume       = {46},
  number       = {5},
  pages        = {387--421},
  year         = {2022},
  url          = {https://doi.org/10.1080/01611194.2021.1920070},
  doi          = {10.1080/01611194.2021.1920070},
  timestamp    = {Mon, 05 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/CourtoisG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Dooley22,
  author       = {John F. Dooley},
  title        = {Review of \emph{codebreaker} by \emph{Marc McMenamin}},
  journal      = {Cryptologia},
  volume       = {46},
  number       = {6},
  pages        = {556--560},
  year         = {2022},
  url          = {https://doi.org/10.1080/01611194.2022.2037929},
  doi          = {10.1080/01611194.2022.2037929},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Dooley22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/DuninEHKLS22,
  author       = {Elonka Dunin and
                  Magnus Ekhall and
                  Konstantin Hamidullin and
                  Nils Kopal and
                  George Lasry and
                  Klaus Schmeh},
  title        = {How we set new world records in breaking Playfair ciphertexts},
  journal      = {Cryptologia},
  volume       = {46},
  number       = {4},
  pages        = {302--322},
  year         = {2022},
  url          = {https://doi.org/10.1080/01611194.2021.1905734},
  doi          = {10.1080/01611194.2021.1905734},
  timestamp    = {Fri, 11 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/DuninEHKLS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/EdemskiyWX22,
  author       = {Vladimir Edemskiy and
                  Chenhuang Wu and
                  Chunxiang Xu},
  title        = {Improvements on \emph{k}-error linear complexity of \emph{q}-ary sequences
                  derived from Euler quotients},
  journal      = {Cryptologia},
  volume       = {46},
  number       = {2},
  pages        = {148--166},
  year         = {2022},
  url          = {https://doi.org/10.1080/01611194.2020.1827312},
  doi          = {10.1080/01611194.2020.1827312},
  timestamp    = {Fri, 11 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/EdemskiyWX22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kalachi22,
  author       = {Herv{\'{e}} Tal{\'{e}} Kalachi},
  title        = {On the failure of the smart approach of the {GPT} cryptosystem},
  journal      = {Cryptologia},
  volume       = {46},
  number       = {2},
  pages        = {167--182},
  year         = {2022},
  url          = {https://doi.org/10.1080/01611194.2020.1829181},
  doi          = {10.1080/01611194.2020.1829181},
  timestamp    = {Mon, 05 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kalachi22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/KopalW22,
  author       = {Nils Kopal and
                  Michelle Waldisp{\"{u}}hl},
  title        = {Deciphering three diplomatic letters sent by Maximilian {II} in 1575},
  journal      = {Cryptologia},
  volume       = {46},
  number       = {2},
  pages        = {103--127},
  year         = {2022},
  url          = {https://doi.org/10.1080/01611194.2020.1858370},
  doi          = {10.1080/01611194.2020.1858370},
  timestamp    = {Tue, 06 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/KopalW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Lehofer22,
  author       = {Anna Lehofer},
  title        = {Applying hierarchical clustering to homophonic substitution ciphers
                  using historical corpora},
  journal      = {Cryptologia},
  volume       = {46},
  number       = {5},
  pages        = {422--438},
  year         = {2022},
  url          = {https://doi.org/10.1080/01611194.2021.1918801},
  doi          = {10.1080/01611194.2021.1918801},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Lehofer22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/MishraR22,
  author       = {P. R. Mishra and
                  S. C. Ramola},
  title        = {{FCSR} connection integers: efficient generation, testing and counting},
  journal      = {Cryptologia},
  volume       = {46},
  number       = {5},
  pages        = {439--460},
  year         = {2022},
  url          = {https://doi.org/10.1080/01611194.2021.1914775},
  doi          = {10.1080/01611194.2021.1914775},
  timestamp    = {Fri, 11 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/MishraR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Morgan22,
  author       = {Roger J. Morgan},
  title        = {Rudyard Kipling's unsolved cryptogram},
  journal      = {Cryptologia},
  volume       = {46},
  number       = {6},
  pages        = {485--497},
  year         = {2022},
  url          = {https://doi.org/10.1080/01611194.2021.1938297},
  doi          = {10.1080/01611194.2021.1938297},
  timestamp    = {Fri, 11 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Morgan22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Parmentier22,
  author       = {Fran{\c{c}}ois Parmentier},
  title        = {Deciphering the Voynich manuscript: propositions to unlock research},
  journal      = {Cryptologia},
  volume       = {46},
  number       = {5},
  pages        = {461--484},
  year         = {2022},
  url          = {https://doi.org/10.1080/01611194.2021.1919944},
  doi          = {10.1080/01611194.2021.1919944},
  timestamp    = {Mon, 05 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Parmentier22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Relkin22,
  author       = {Paul W. Relkin},
  title        = {Solving the Olum 1 Cipher},
  journal      = {Cryptologia},
  volume       = {46},
  number       = {4},
  pages        = {291--301},
  year         = {2022},
  url          = {https://doi.org/10.1080/01611194.2021.1974124},
  doi          = {10.1080/01611194.2021.1974124},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Relkin22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/TuncerK22,
  author       = {T{\"{u}}rker Tuncer and
                  Huseyin Yuce Kurum},
  title        = {A novel Collatz conjecture-based digital image watermarking method},
  journal      = {Cryptologia},
  volume       = {46},
  number       = {2},
  pages        = {128--147},
  year         = {2022},
  url          = {https://doi.org/10.1080/01611194.2020.1821408},
  doi          = {10.1080/01611194.2020.1821408},
  timestamp    = {Fri, 11 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/TuncerK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/BashirA21,
  author       = {Malik Zia Ullah Bashir and
                  Rashid Ali},
  title        = {Cryptanalysis and improvement of a blind multi-document signcryption
                  scheme},
  journal      = {Cryptologia},
  volume       = {45},
  number       = {5},
  pages        = {450--464},
  year         = {2021},
  url          = {https://doi.org/10.1080/01611194.2020.1755913},
  doi          = {10.1080/01611194.2020.1755913},
  timestamp    = {Sat, 01 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/BashirA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Bonavoglia21,
  author       = {Paolo Bonavoglia},
  title        = {Review of classical cryptology at play by Silvio Coccaro},
  journal      = {Cryptologia},
  volume       = {45},
  number       = {1},
  pages        = {94--96},
  year         = {2021},
  url          = {https://doi.org/10.1080/01611194.2020.1793824},
  doi          = {10.1080/01611194.2020.1793824},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Bonavoglia21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Bouchaudy21,
  author       = {Jean{-}Fran{\c{c}}ois Bouchaudy},
  title        = {Enigma: the spoils of Gustave Bertrand, or "par o{\`{u}} tout a commenc{\'{e}}"},
  journal      = {Cryptologia},
  volume       = {45},
  number       = {4},
  pages        = {309--341},
  year         = {2021},
  url          = {https://doi.org/10.1080/01611194.2020.1736205},
  doi          = {10.1080/01611194.2020.1736205},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Bouchaudy21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Bures21,
  author       = {Kenneth J. Bures},
  title        = {Cracking {PURPLE:} cryptanalysis of the Angooki Taipu {B} switch tables},
  journal      = {Cryptologia},
  volume       = {45},
  number       = {1},
  pages        = {1--43},
  year         = {2021},
  url          = {https://doi.org/10.1080/01611194.2019.1706064},
  doi          = {10.1080/01611194.2019.1706064},
  timestamp    = {Thu, 18 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Bures21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/ChauhanGV21,
  author       = {Dimpy Chauhan and
                  Indivar Gupta and
                  Rashmi Verma},
  title        = {Quasigroups and their applications in cryptography},
  journal      = {Cryptologia},
  volume       = {45},
  number       = {3},
  pages        = {227--265},
  year         = {2021},
  url          = {https://doi.org/10.1080/01611194.2020.1721615},
  doi          = {10.1080/01611194.2020.1721615},
  timestamp    = {Fri, 25 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/ChauhanGV21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Christensen21,
  author       = {Chris Christensen},
  title        = {Review of Breaking Teleprinter Ciphers at Bletchley Park by James
                  A. Reeds, Whitfield Diffie, and J. V. Field},
  journal      = {Cryptologia},
  volume       = {45},
  number       = {1},
  pages        = {88--93},
  year         = {2021},
  url          = {https://doi.org/10.1080/01611194.2020.1804484},
  doi          = {10.1080/01611194.2020.1804484},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Christensen21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Christensen21a,
  author       = {Chris Christensen},
  title        = {Review of \emph{Operation Vengeance: The Astonishing Aerial Ambush
                  That Changed World War II} by Dan Hampton},
  journal      = {Cryptologia},
  volume       = {45},
  number       = {5},
  pages        = {474--477},
  year         = {2021},
  url          = {https://doi.org/10.1080/01611194.2020.1839816},
  doi          = {10.1080/01611194.2020.1839816},
  timestamp    = {Fri, 11 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Christensen21a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Christensen21b,
  author       = {Chris Christensen},
  title        = {Review of \emph{The Codebreakers of Bletchley Park} by Dermot Turing},
  journal      = {Cryptologia},
  volume       = {45},
  number       = {6},
  pages        = {563--564},
  year         = {2021},
  url          = {https://doi.org/10.1080/01611194.2020.1839814},
  doi          = {10.1080/01611194.2020.1839814},
  timestamp    = {Fri, 11 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Christensen21b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Christensen21c,
  author       = {Chris Christensen},
  title        = {Review of \emph{A Course in Cryptography} by Heiko Knospe},
  journal      = {Cryptologia},
  volume       = {45},
  number       = {6},
  pages        = {565--568},
  year         = {2021},
  url          = {https://doi.org/10.1080/01611194.2020.1804483},
  doi          = {10.1080/01611194.2020.1804483},
  timestamp    = {Fri, 11 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Christensen21c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Christensen21d,
  author       = {Chris Christensen},
  title        = {Review of \emph{The {U.S.} Navy's On-the-Roof Gang, Volume Two, War
                  in the Pacific} by Matt Zullo},
  journal      = {Cryptologia},
  volume       = {45},
  number       = {6},
  pages        = {569--570},
  year         = {2021},
  url          = {https://doi.org/10.1080/01611194.2021.1878307},
  doi          = {10.1080/01611194.2021.1878307},
  timestamp    = {Fri, 11 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Christensen21d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Christensen21e,
  author       = {Chris Christensen},
  title        = {Review of \emph{Codebreaking: {A} Practical Guide} by Elonka Dunin
                  and Klaus Schmeh},
  journal      = {Cryptologia},
  volume       = {45},
  number       = {6},
  pages        = {497},
  year         = {2021},
  url          = {https://doi.org/10.1080/01611194.2021.1873207},
  doi          = {10.1080/01611194.2021.1873207},
  timestamp    = {Fri, 11 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Christensen21e.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Courtois21,
  author       = {Nicolas T. Courtois},
  title        = {A nonlinear invariant attack on {T-310} with the original Boolean
                  function},
  journal      = {Cryptologia},
  volume       = {45},
  number       = {2},
  pages        = {178--192},
  year         = {2021},
  url          = {https://doi.org/10.1080/01611194.2020.1736207},
  doi          = {10.1080/01611194.2020.1736207},
  timestamp    = {Tue, 23 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Courtois21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Daruka21,
  author       = {Istv{\'{a}}n Daruka},
  title        = {On the Voynich manuscript},
  journal      = {Cryptologia},
  volume       = {45},
  number       = {1},
  pages        = {44--80},
  year         = {2021},
  url          = {https://doi.org/10.1080/01611194.2019.1706063},
  doi          = {10.1080/01611194.2019.1706063},
  timestamp    = {Tue, 01 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Daruka21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Dooley21,
  author       = {John F. Dooley},
  title        = {Review of Flight of the Fox by Gray Basnight},
  journal      = {Cryptologia},
  volume       = {45},
  number       = {3},
  pages        = {287--288},
  year         = {2021},
  url          = {https://doi.org/10.1080/01611194.2020.1829182},
  doi          = {10.1080/01611194.2020.1829182},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Dooley21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Erskine21,
  author       = {Ralph Erskine},
  title        = {Review of The Nazi Spy Ring in America by Rhodri Jeffreys-Jones},
  journal      = {Cryptologia},
  volume       = {45},
  number       = {4},
  pages        = {379--382},
  year         = {2021},
  url          = {https://doi.org/10.1080/01611194.2021.1878308},
  doi          = {10.1080/01611194.2021.1878308},
  timestamp    = {Mon, 26 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Erskine21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/FuensantaBB21,
  author       = {Jos{\'{e}} Ram{\'{o}}n Soler Fuensanta and
                  H{\'{e}}ctor Soler Bonet and
                  Diego Navarro Bonilla},
  title        = {How to make a codebook versatile. The example of the {ASLET} code},
  journal      = {Cryptologia},
  volume       = {45},
  number       = {2},
  pages        = {129--166},
  year         = {2021},
  url          = {https://doi.org/10.1080/01611194.2020.1718800},
  doi          = {10.1080/01611194.2020.1718800},
  timestamp    = {Thu, 18 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/FuensantaBB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Geraud-StewartN21,
  author       = {R{\'{e}}mi G{\'{e}}raud{-}Stewart and
                  David Naccache},
  title        = {A French cipher from the late 19th century},
  journal      = {Cryptologia},
  volume       = {45},
  number       = {4},
  pages        = {342--370},
  year         = {2021},
  url          = {https://doi.org/10.1080/01611194.2020.1753265},
  doi          = {10.1080/01611194.2020.1753265},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Geraud-StewartN21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Griffiths21,
  author       = {Barry J. Griffiths},
  title        = {Cryptography in undergraduate education: perceptions of postgraduate
                  students},
  journal      = {Cryptologia},
  volume       = {45},
  number       = {6},
  pages        = {553--562},
  year         = {2021},
  url          = {https://doi.org/10.1080/01611194.2020.1804482},
  doi          = {10.1080/01611194.2020.1804482},
  timestamp    = {Tue, 06 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Griffiths21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Hanyok21,
  author       = {Robert J. Hanyok},
  title        = {Sources and methods: Searching for cryptologic records in the findings
                  of post-World War {II} allied technical surveys and commissions},
  journal      = {Cryptologia},
  volume       = {45},
  number       = {4},
  pages        = {371--378},
  year         = {2021},
  url          = {https://doi.org/10.1080/01611194.2021.1921072},
  doi          = {10.1080/01611194.2021.1921072},
  timestamp    = {Mon, 26 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Hanyok21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/LasryMK21,
  author       = {George Lasry and
                  Be{\'{a}}ta Megyesi and
                  Nils Kopal},
  title        = {Deciphering papal ciphers from the 16th to the 18th Century},
  journal      = {Cryptologia},
  volume       = {45},
  number       = {6},
  pages        = {479--540},
  year         = {2021},
  url          = {https://doi.org/10.1080/01611194.2020.1755915},
  doi          = {10.1080/01611194.2020.1755915},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/LasryMK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/LasryNA21,
  author       = {George Lasry and
                  Ingo Niebel and
                  Torbj{\"{o}}rn Andersson},
  title        = {Deciphering German diplomatic and naval attach{\'{e}} messages
                  from 1900-1915},
  journal      = {Cryptologia},
  volume       = {45},
  number       = {5},
  pages        = {383--425},
  year         = {2021},
  url          = {https://doi.org/10.1080/01611194.2020.1755914},
  doi          = {10.1080/01611194.2020.1755914},
  timestamp    = {Fri, 11 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/LasryNA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/MastanP21,
  author       = {J. Mohamedmoideen Kader Mastan and
                  R. Pandian},
  title        = {Cryptanalysis of two similar chaos-based image encryption schemes},
  journal      = {Cryptologia},
  volume       = {45},
  number       = {6},
  pages        = {541--552},
  year         = {2021},
  url          = {https://doi.org/10.1080/01611194.2020.1814447},
  doi          = {10.1080/01611194.2020.1814447},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/MastanP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Nedved21,
  author       = {Gregory J. Nedved},
  title        = {Herbert O. Yardley revisited: what does the new evidence say?},
  journal      = {Cryptologia},
  volume       = {45},
  number       = {2},
  pages        = {102--128},
  year         = {2021},
  url          = {https://doi.org/10.1080/01611194.2020.1767706},
  doi          = {10.1080/01611194.2020.1767706},
  timestamp    = {Thu, 18 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Nedved21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Patterson21,
  author       = {Blain Patterson},
  title        = {Analyzing student understanding of cryptography using the {SOLO} taxonomy},
  journal      = {Cryptologia},
  volume       = {45},
  number       = {5},
  pages        = {439--449},
  year         = {2021},
  url          = {https://doi.org/10.1080/01611194.2020.1755746},
  doi          = {10.1080/01611194.2020.1755746},
  timestamp    = {Fri, 11 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Patterson21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/PhelanS21,
  author       = {Ronald Phelan and
                  David Simpson},
  title        = {Ludlings: not all fun and games},
  journal      = {Cryptologia},
  volume       = {45},
  number       = {5},
  pages        = {426--433},
  year         = {2021},
  url          = {https://doi.org/10.1080/01611194.2020.1761482},
  doi          = {10.1080/01611194.2020.1761482},
  timestamp    = {Fri, 11 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/PhelanS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Smoot21,
  author       = {Betsy Rohaly Smoot},
  title        = {Sources and methods: uncovering the story of American Cryptology in
                  World War {I}},
  journal      = {Cryptologia},
  volume       = {45},
  number       = {1},
  pages        = {81--87},
  year         = {2021},
  url          = {https://doi.org/10.1080/01611194.2020.1858371},
  doi          = {10.1080/01611194.2020.1858371},
  timestamp    = {Tue, 01 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Smoot21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Smoot21a,
  author       = {Betsy Rohaly Smoot},
  title        = {Sources and methods for cryptologic history: researching individuals
                  (and the biography boom)},
  journal      = {Cryptologia},
  volume       = {45},
  number       = {5},
  pages        = {465--473},
  year         = {2021},
  url          = {https://doi.org/10.1080/01611194.2021.1929567},
  doi          = {10.1080/01611194.2021.1929567},
  timestamp    = {Mon, 05 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Smoot21a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/SommervollN21,
  author       = {{\AA}vald {\AA}slaugson Sommervoll and
                  Leif Nilsen},
  title        = {Genetic algorithm attack on Enigma's plugboard},
  journal      = {Cryptologia},
  volume       = {45},
  number       = {3},
  pages        = {194--226},
  year         = {2021},
  url          = {https://doi.org/10.1080/01611194.2020.1721617},
  doi          = {10.1080/01611194.2020.1721617},
  timestamp    = {Fri, 25 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/SommervollN21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Tate21,
  author       = {Kirsten Tate},
  title        = {Identifying concealed messages using authorship attribution},
  journal      = {Cryptologia},
  volume       = {45},
  number       = {2},
  pages        = {167--177},
  year         = {2021},
  url          = {https://doi.org/10.1080/01611194.2020.1736206},
  doi          = {10.1080/01611194.2020.1736206},
  timestamp    = {Thu, 18 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Tate21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Teseleanu21,
  author       = {George Teseleanu},
  title        = {Quasigroups and substitution permutation networks: a failed experiment},
  journal      = {Cryptologia},
  volume       = {45},
  number       = {3},
  pages        = {266--281},
  year         = {2021},
  url          = {https://doi.org/10.1080/01611194.2020.1750506},
  doi          = {10.1080/01611194.2020.1750506},
  timestamp    = {Tue, 13 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Teseleanu21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/TimmS21,
  author       = {Torsten Timm and
                  Andreas Schinner},
  title        = {Review of \emph{The linguistics of the Voynich manuscript} by Claire
                  Bowern and Luke Lindemann},
  journal      = {Cryptologia},
  volume       = {45},
  number       = {5},
  pages        = {434--438},
  year         = {2021},
  url          = {https://doi.org/10.1080/01611194.2021.1911875},
  doi          = {10.1080/01611194.2021.1911875},
  timestamp    = {Fri, 11 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/TimmS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Tokar21,
  author       = {John A. Tokar},
  title        = {{NSA} honors two Cryptologia board members},
  journal      = {Cryptologia},
  volume       = {45},
  number       = {2},
  pages        = {97--101},
  year         = {2021},
  url          = {https://doi.org/10.1080/07352689.2021.1891679},
  doi          = {10.1080/07352689.2021.1891679},
  timestamp    = {Thu, 18 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Tokar21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Wase21,
  author       = {Viktor Wase},
  title        = {Benford's law in the Beale ciphers},
  journal      = {Cryptologia},
  volume       = {45},
  number       = {3},
  pages        = {282--286},
  year         = {2021},
  url          = {https://doi.org/10.1080/01611194.2020.1821409},
  doi          = {10.1080/01611194.2020.1821409},
  timestamp    = {Fri, 25 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Wase21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Weierud21,
  author       = {Frode Weierud},
  title        = {In memoriam: Thomas Ralph Erskine {CB} {(1933} - 2021)},
  journal      = {Cryptologia},
  volume       = {45},
  number       = {4},
  pages        = {289--308},
  year         = {2021},
  url          = {https://doi.org/10.1080/01611194.2021.1935363},
  doi          = {10.1080/01611194.2021.1935363},
  timestamp    = {Thu, 29 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Weierud21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/X21,
  title        = {18th cryptologic history symposium},
  journal      = {Cryptologia},
  volume       = {45},
  number       = {3},
  pages        = {193},
  year         = {2021},
  url          = {https://doi.org/10.1080/01611194.2021.1915382},
  doi          = {10.1080/01611194.2021.1915382},
  timestamp    = {Fri, 25 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/X21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Alin20,
  author       = {Jonas Alin},
  title        = {Principal component analysis of characters in the Voynich manuscript
                  and their classifications based on comparative analysis of writings
                  in known languages},
  journal      = {Cryptologia},
  volume       = {44},
  number       = {5},
  pages        = {421--437},
  year         = {2020},
  url          = {https://doi.org/10.1080/01611194.2019.1688203},
  doi          = {10.1080/01611194.2019.1688203},
  timestamp    = {Sat, 19 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Alin20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/BeaverB20,
  author       = {Cheryl L. Beaver and
                  Stuart Boersma},
  title        = {Celebrating ten years of {KRYPTOS:} a series of cryptanalysis},
  journal      = {Cryptologia},
  volume       = {44},
  number       = {3},
  pages        = {257--266},
  year         = {2020},
  url          = {https://doi.org/10.1080/01611194.2019.1670283},
  doi          = {10.1080/01611194.2019.1670283},
  timestamp    = {Wed, 13 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/BeaverB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/BiswasD20,
  author       = {Anindya Kumar Biswas and
                  Mou Dasgupta},
  title        = {Two polynomials based (t, n) threshold secret sharing scheme with
                  cheating detection},
  journal      = {Cryptologia},
  volume       = {44},
  number       = {4},
  pages        = {357--370},
  year         = {2020},
  url          = {https://doi.org/10.1080/01611194.2020.1717676},
  doi          = {10.1080/01611194.2020.1717676},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/BiswasD20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Bonavoglia20,
  author       = {Paolo Bonavoglia},
  title        = {The cifra delle caselle a {XVI} Century superencrypted cipher},
  journal      = {Cryptologia},
  volume       = {44},
  number       = {1},
  pages        = {39--52},
  year         = {2020},
  url          = {https://doi.org/10.1080/01611194.2019.1609132},
  doi          = {10.1080/01611194.2019.1609132},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Bonavoglia20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Christensen20,
  author       = {Chris Christensen},
  title        = {Review of code cracking for kids by Jean Daigneau},
  journal      = {Cryptologia},
  volume       = {44},
  number       = {4},
  pages        = {383--384},
  year         = {2020},
  url          = {https://doi.org/10.1080/01611194.2020.1754965},
  doi          = {10.1080/01611194.2020.1754965},
  timestamp    = {Fri, 17 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Christensen20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Christensen20a,
  author       = {Chris Christensen},
  title        = {Review of The Enigma Bulletin edited by Zdzis{\l}aw J. Kapera},
  journal      = {Cryptologia},
  volume       = {44},
  number       = {6},
  pages        = {569--572},
  year         = {2020},
  url          = {https://doi.org/10.1080/01611194.2020.1732497},
  doi          = {10.1080/01611194.2020.1732497},
  timestamp    = {Fri, 13 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Christensen20a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Christensen20b,
  author       = {Chris Christensen},
  title        = {Review of Bletchley Park and D-Day by David Kenyon},
  journal      = {Cryptologia},
  volume       = {44},
  number       = {6},
  pages        = {573--576},
  year         = {2020},
  url          = {https://doi.org/10.1080/01611194.2020.1732498},
  doi          = {10.1080/01611194.2020.1732498},
  timestamp    = {Fri, 13 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Christensen20b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/CourtoisG20,
  author       = {Nicolas T. Courtois and
                  Marios Georgiou},
  title        = {Variable elimination strategies and construction of nonlinear polynomial
                  invariant attacks on {T-310}},
  journal      = {Cryptologia},
  volume       = {44},
  number       = {1},
  pages        = {20--38},
  year         = {2020},
  url          = {https://doi.org/10.1080/01611194.2019.1650845},
  doi          = {10.1080/01611194.2019.1650845},
  timestamp    = {Thu, 19 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/CourtoisG20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/CourtoisPA20,
  author       = {Nicolas T. Courtois and
                  Aidan Patrick and
                  Matteo Abbondati},
  title        = {Construction of a polynomial invariant annihilation attack of degree
                  7 for {T-310}},
  journal      = {Cryptologia},
  volume       = {44},
  number       = {4},
  pages        = {289--314},
  year         = {2020},
  url          = {https://doi.org/10.1080/01611194.2019.1706062},
  doi          = {10.1080/01611194.2019.1706062},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/CourtoisPA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/DiazSJ20,
  author       = {Alejandra Diaz and
                  Alan T. Sherman and
                  Anupam Joshi},
  title        = {Phishing in an academic community: {A} study of user susceptibility
                  and behavior},
  journal      = {Cryptologia},
  volume       = {44},
  number       = {1},
  pages        = {53--67},
  year         = {2020},
  url          = {https://doi.org/10.1080/01611194.2019.1623343},
  doi          = {10.1080/01611194.2019.1623343},
  timestamp    = {Thu, 19 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/DiazSJ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Dooley20,
  author       = {John F. Dooley},
  title        = {Review of The Third Reich is Listening by Christian Jennings},
  journal      = {Cryptologia},
  volume       = {44},
  number       = {1},
  pages        = {91--95},
  year         = {2020},
  url          = {https://doi.org/10.1080/01611194.2019.1655505},
  doi          = {10.1080/01611194.2019.1655505},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Dooley20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Dooley20a,
  author       = {John F. Dooley},
  title        = {Review of the secret world by Christopher Andrew},
  journal      = {Cryptologia},
  volume       = {44},
  number       = {3},
  pages        = {280--284},
  year         = {2020},
  url          = {https://doi.org/10.1080/01611194.2019.1706210},
  doi          = {10.1080/01611194.2019.1706210},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Dooley20a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Dooley20b,
  author       = {John F. Dooley},
  title        = {Review of {A} Most Enigmatic War by James Goodchild},
  journal      = {Cryptologia},
  volume       = {44},
  number       = {5},
  pages        = {477--480},
  year         = {2020},
  url          = {https://doi.org/10.1080/01611194.2019.1688204},
  doi          = {10.1080/01611194.2019.1688204},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Dooley20b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/GorodilovaACHIK20,
  author       = {Anastasiya Gorodilova and
                  Sergey Agievich and
                  Claude Carlet and
                  Xiang{-}dong Hou and
                  Valeriya Idrisova and
                  Nikolay Kolomeec and
                  Alexandr Kutsenko and
                  Luca Mariot and
                  Alexey Oblaukhov and
                  Stjepan Picek and
                  Bart Preneel and
                  Razvan Rosie and
                  Natalia N. Tokareva},
  title        = {The Fifth International Students' Olympiad in cryptography - {NSUCRYPTO:}
                  Problems and their solutions},
  journal      = {Cryptologia},
  volume       = {44},
  number       = {3},
  pages        = {223--256},
  year         = {2020},
  url          = {https://doi.org/10.1080/01611194.2019.1670282},
  doi          = {10.1080/01611194.2019.1670282},
  timestamp    = {Fri, 22 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/GorodilovaACHIK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/HanyokS20,
  author       = {Robert J. Hanyok and
                  Betsy Rohaly Smoot},
  title        = {Sources and methods series: considering other record groups in Nara
                  holding cryptologic and cryptologic-related records},
  journal      = {Cryptologia},
  volume       = {44},
  number       = {5},
  pages        = {472--476},
  year         = {2020},
  url          = {https://doi.org/10.1080/01611194.2020.1792003},
  doi          = {10.1080/01611194.2020.1792003},
  timestamp    = {Thu, 17 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/HanyokS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/HanyokS20a,
  author       = {Robert J. Hanyok and
                  Betsy Rohaly Smoot},
  title        = {Sources and methods: contingency and its role in researching records
                  of cryptologic history - a discussion and some lessons to apply for
                  future research},
  journal      = {Cryptologia},
  volume       = {44},
  number       = {6},
  pages        = {560--568},
  year         = {2020},
  url          = {https://doi.org/10.1080/01611194.2020.1834989},
  doi          = {10.1080/01611194.2020.1834989},
  timestamp    = {Fri, 13 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/HanyokS20a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kaeding20,
  author       = {Thomas Kaeding},
  title        = {Slippery hill-climbing technique for ciphertext-only cryptanalysis
                  of periodic polyalphabetic substitution ciphers},
  journal      = {Cryptologia},
  volume       = {44},
  number       = {3},
  pages        = {205--222},
  year         = {2020},
  url          = {https://doi.org/10.1080/01611194.2019.1655504},
  doi          = {10.1080/01611194.2019.1655504},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kaeding20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/KenyonW20,
  author       = {David Kenyon and
                  Frode Weierud},
  title        = {Enigma {G:} The counter Enigma},
  journal      = {Cryptologia},
  volume       = {44},
  number       = {5},
  pages        = {385--420},
  year         = {2020},
  url          = {https://doi.org/10.1080/01611194.2019.1661134},
  doi          = {10.1080/01611194.2019.1661134},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/KenyonW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/KhatoonT20,
  author       = {Shaheena Khatoon and
                  Balwant Singh Thakur},
  title        = {Cryptanalysis and improvement of authentication scheme for roaming
                  service in ubiquitous network},
  journal      = {Cryptologia},
  volume       = {44},
  number       = {4},
  pages        = {315--340},
  year         = {2020},
  url          = {https://doi.org/10.1080/01611194.2019.1706061},
  doi          = {10.1080/01611194.2019.1706061},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/KhatoonT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/KumarSPP20,
  author       = {Manoj Kumar and
                  T. S. Suresh and
                  Saibal K. Pal and
                  Anupama Panigrahi},
  title        = {Optimal differential trails in lightweight block ciphers {ANU} and
                  {PICO}},
  journal      = {Cryptologia},
  volume       = {44},
  number       = {1},
  pages        = {68--78},
  year         = {2020},
  url          = {https://doi.org/10.1080/01611194.2019.1650844},
  doi          = {10.1080/01611194.2019.1650844},
  timestamp    = {Thu, 19 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/KumarSPP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/McCarthy20,
  author       = {Jerry McCarthy},
  title        = {Review of the 2nd International Conference on Historical Cryptology
                  in Mons, Belgium},
  journal      = {Cryptologia},
  volume       = {44},
  number       = {3},
  pages        = {285--288},
  year         = {2020},
  url          = {https://doi.org/10.1080/01611194.2019.1659447},
  doi          = {10.1080/01611194.2019.1659447},
  timestamp    = {Wed, 13 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/McCarthy20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/MegyesiEFKLLLPW20,
  author       = {Be{\'{a}}ta Megyesi and
                  Bernhard Esslinger and
                  Alicia Forn{\'{e}}s and
                  Nils Kopal and
                  Benedek L{\'{a}}ng and
                  George Lasry and
                  Karl de Leeuw and
                  Eva Pettersson and
                  Arno Wacker and
                  Michelle Waldisp{\"{u}}hl},
  title        = {Decryption of historical manuscripts: the {DECRYPT} project},
  journal      = {Cryptologia},
  volume       = {44},
  number       = {6},
  pages        = {545--559},
  year         = {2020},
  url          = {https://doi.org/10.1080/01611194.2020.1716410},
  doi          = {10.1080/01611194.2020.1716410},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/MegyesiEFKLLLPW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/MelkaS20,
  author       = {Tomi S. Melka and
                  Robert M. Schoch},
  title        = {Exploring a mysterious tablet from Easter Island: the issues of authenticity
                  and falsifiability in rongorongo studies},
  journal      = {Cryptologia},
  volume       = {44},
  number       = {6},
  pages        = {481--544},
  year         = {2020},
  url          = {https://doi.org/10.1080/01611194.2019.1706065},
  doi          = {10.1080/01611194.2019.1706065},
  timestamp    = {Fri, 13 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/MelkaS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/NiehuesGPZ20,
  author       = {Lucas Boppre Niehues and
                  Joachim von zur Gathen and
                  Lucas Pandolfo Perin and
                  Ana Zumalac{\'{a}}rregui},
  title        = {Sidon sets and statistics of the ElGamal function},
  journal      = {Cryptologia},
  volume       = {44},
  number       = {5},
  pages        = {438--450},
  year         = {2020},
  url          = {https://doi.org/10.1080/01611194.2020.1790128},
  doi          = {10.1080/01611194.2020.1790128},
  timestamp    = {Thu, 17 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/NiehuesGPZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/PandeyL20,
  author       = {Prateek Pandey and
                  Ratnesh Litoriya},
  title        = {Securing and authenticating healthcare records through blockchain
                  technology},
  journal      = {Cryptologia},
  volume       = {44},
  number       = {4},
  pages        = {341--356},
  year         = {2020},
  url          = {https://doi.org/10.1080/01611194.2019.1706060},
  doi          = {10.1080/01611194.2019.1706060},
  timestamp    = {Fri, 17 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/PandeyL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/ParkKCY20,
  author       = {Seongmin Park and
                  Juneyeun Kim and
                  Kookrae Cho and
                  Dae Hyun Yum},
  title        = {Finding the key length of a Vigen{\`{e}}re cipher: How to improve
                  the twist algorithm},
  journal      = {Cryptologia},
  volume       = {44},
  number       = {3},
  pages        = {197--204},
  year         = {2020},
  url          = {https://doi.org/10.1080/01611194.2019.1657202},
  doi          = {10.1080/01611194.2019.1657202},
  timestamp    = {Wed, 13 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/ParkKCY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Parsons20,
  author       = {Sarah Parsons},
  title        = {Sources and methods for cryptologic history: NSA.gov - a tour through
                  its history and resources},
  journal      = {Cryptologia},
  volume       = {44},
  number       = {4},
  pages        = {371--382},
  year         = {2020},
  url          = {https://doi.org/10.1080/01611194.2020.1753264},
  doi          = {10.1080/01611194.2020.1753264},
  timestamp    = {Fri, 17 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Parsons20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/SaikiaH20,
  author       = {Monjul Saikia and
                  Md. Anwar Hussain},
  title        = {Efficient data encryption technique using quaternions for wireless
                  sensor network},
  journal      = {Cryptologia},
  volume       = {44},
  number       = {5},
  pages        = {451--471},
  year         = {2020},
  url          = {https://doi.org/10.1080/01611194.2020.1755745},
  doi          = {10.1080/01611194.2020.1755745},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/SaikiaH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Sherman20,
  author       = {David Sherman},
  title        = {Sources and methods for cryptologic history: the William and Elizebeth
                  Smith Friedman collections},
  journal      = {Cryptologia},
  volume       = {44},
  number       = {3},
  pages        = {267--279},
  year         = {2020},
  url          = {https://doi.org/10.1080/01611194.2020.1733134},
  doi          = {10.1080/01611194.2020.1733134},
  timestamp    = {Wed, 13 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Sherman20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/ShermanSH20,
  author       = {David Sherman and
                  Betsy Rohaly Smoot and
                  Robert J. Hanyok},
  title        = {Introducing a new Cryptologia series: Sources and methods for cryptologic
                  history},
  journal      = {Cryptologia},
  volume       = {44},
  number       = {1},
  pages        = {79--81},
  year         = {2020},
  url          = {https://doi.org/10.1080/01611194.2019.1670284},
  doi          = {10.1080/01611194.2019.1670284},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/ShermanSH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/SmootH20,
  author       = {Betsy Rohaly Smoot and
                  Robert J. Hanyok},
  title        = {Sources and methods for cryptologic history: Research at the {US}
                  National Archives-the "Big Two" Record Groups},
  journal      = {Cryptologia},
  volume       = {44},
  number       = {2},
  pages        = {172--196},
  year         = {2020},
  url          = {https://doi.org/10.1080/01611194.2019.1706066},
  doi          = {10.1080/01611194.2019.1706066},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/SmootH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/TimmS20,
  author       = {Torsten Timm and
                  Andreas Schinner},
  title        = {A possible generating algorithm of the Voynich manuscript},
  journal      = {Cryptologia},
  volume       = {44},
  number       = {1},
  pages        = {1--19},
  year         = {2020},
  url          = {https://doi.org/10.1080/01611194.2019.1596999},
  doi          = {10.1080/01611194.2019.1596999},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/TimmS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/WeierudZ20,
  author       = {Frode Weierud and
                  Sandy Zabell},
  title        = {German mathematicians and cryptology in {WWII}},
  journal      = {Cryptologia},
  volume       = {44},
  number       = {2},
  pages        = {97--171},
  year         = {2020},
  url          = {https://doi.org/10.1080/01611194.2019.1600076},
  doi          = {10.1080/01611194.2019.1600076},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/WeierudZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/X20,
  title        = {Review of two collections of essays about Alan Turing},
  journal      = {Cryptologia},
  volume       = {44},
  number       = {1},
  pages        = {82--86},
  year         = {2020},
  url          = {https://doi.org/10.1080/01611194.2019.1650846},
  doi          = {10.1080/01611194.2019.1650846},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/X20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/X20a,
  title        = {Review of Real Life Cryptology by Benedek L{\'{a}}ng},
  journal      = {Cryptologia},
  volume       = {44},
  number       = {1},
  pages        = {87--90},
  year         = {2020},
  url          = {https://doi.org/10.1080/01611194.2019.1650847},
  doi          = {10.1080/01611194.2019.1650847},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/X20a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/AlhadawiZIL19,
  author       = {Hussam S. Alhadawi and
                  Mohamad Fadli Zolkipli and
                  Saba M. Ismail and
                  Dragan Lambic},
  title        = {Designing a pseudorandom bit generator based on LFSRs and a discrete
                  chaotic map},
  journal      = {Cryptologia},
  volume       = {43},
  number       = {3},
  pages        = {190--211},
  year         = {2019},
  url          = {https://doi.org/10.1080/01611194.2018.1548390},
  doi          = {10.1080/01611194.2018.1548390},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/AlhadawiZIL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/AyatG19,
  author       = {S. Masih Ayat and
                  Meysam Ghahramani},
  title        = {A recursive algorithm for solving "a secret sharing" problem},
  journal      = {Cryptologia},
  volume       = {43},
  number       = {6},
  pages        = {497--503},
  year         = {2019},
  url          = {https://doi.org/10.1080/01611194.2019.1596996},
  doi          = {10.1080/01611194.2019.1596996},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/AyatG19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/BentajerHAIF19,
  author       = {Ahmed Bentajer and
                  Mustapha Hedabou and
                  Karim Abouelmehdi and
                  Zakaria Igarramen and
                  Said El Fezazi},
  title        = {An IBE-based design for assured deletion in cloud storage},
  journal      = {Cryptologia},
  volume       = {43},
  number       = {3},
  pages        = {254--265},
  year         = {2019},
  url          = {https://doi.org/10.1080/01611194.2018.1549123},
  doi          = {10.1080/01611194.2018.1549123},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/BentajerHAIF19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Bonavoglia19,
  author       = {Paolo Bonavoglia},
  title        = {Bellaso's 1552 cipher recovered in Venice},
  journal      = {Cryptologia},
  volume       = {43},
  number       = {6},
  pages        = {459--465},
  year         = {2019},
  url          = {https://doi.org/10.1080/01611194.2019.1596181},
  doi          = {10.1080/01611194.2019.1596181},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Bonavoglia19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Bouchaudy19,
  author       = {Jean{-}Fran{\c{c}}ois Bouchaudy},
  title        = {Genuine French {WWII} {M-209} cryptograms},
  journal      = {Cryptologia},
  volume       = {43},
  number       = {5},
  pages        = {359--371},
  year         = {2019},
  url          = {https://doi.org/10.1080/01611194.2019.1596180},
  doi          = {10.1080/01611194.2019.1596180},
  timestamp    = {Thu, 28 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Bouchaudy19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/BussiDMD19,
  author       = {Khushboo Bussi and
                  Dhananjoy Dey and
                  Prasanna Raghaw Mishra and
                  B. K. Dass},
  title        = {{MGR} Hash Functions},
  journal      = {Cryptologia},
  volume       = {43},
  number       = {5},
  pages        = {372--390},
  year         = {2019},
  url          = {https://doi.org/10.1080/01611194.2019.1596995},
  doi          = {10.1080/01611194.2019.1596995},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/BussiDMD19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Christensen19,
  author       = {Chris Christensen},
  title        = {Review of The Spy Who Couldn't Spell by Yudhijit Bhattacharjee},
  journal      = {Cryptologia},
  volume       = {43},
  number       = {1},
  pages        = {65--68},
  year         = {2019},
  url          = {https://doi.org/10.1080/01611194.2018.1471429},
  doi          = {10.1080/01611194.2018.1471429},
  timestamp    = {Mon, 14 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Christensen19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Christensen19a,
  author       = {Chris Christensen},
  title        = {Review of Stanley Johnston'S Blunder: the Reporter Who Spilled the
                  Secret Behind the {U.S.} Navy'S Victory at Midway by Elliot Carlson},
  journal      = {Cryptologia},
  volume       = {43},
  number       = {1},
  pages        = {69--76},
  year         = {2019},
  url          = {https://doi.org/10.1080/01611194.2018.1503208},
  doi          = {10.1080/01611194.2018.1503208},
  timestamp    = {Mon, 14 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Christensen19a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Christensen19b,
  author       = {Chris Christensen},
  title        = {Review of Alastair Denniston: Code-Breaking from Room 40 to Berkeley
                  Street and the Birth of {GCHQ} by Joel Greenberg},
  journal      = {Cryptologia},
  volume       = {43},
  number       = {1},
  pages        = {77--80},
  year         = {2019},
  url          = {https://doi.org/10.1080/01611194.2018.1503209},
  doi          = {10.1080/01611194.2018.1503209},
  timestamp    = {Mon, 14 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Christensen19b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Christensen19c,
  author       = {Chris Christensen},
  title        = {Edward Hugh Simpson {CB} {(10} December 1922 - 5 February 2019)},
  journal      = {Cryptologia},
  volume       = {43},
  number       = {2},
  pages        = {81--83},
  year         = {2019},
  url          = {https://doi.org/10.1080/01611194.2019.1583823},
  doi          = {10.1080/01611194.2019.1583823},
  timestamp    = {Fri, 07 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Christensen19c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Christensen19d,
  author       = {Chris Christensen},
  title        = {Review of History of Cryptography and Cryptanalysis by John Dooley},
  journal      = {Cryptologia},
  volume       = {43},
  number       = {6},
  pages        = {536--538},
  year         = {2019},
  url          = {https://doi.org/10.1080/01611194.2019.1623344},
  doi          = {10.1080/01611194.2019.1623344},
  timestamp    = {Wed, 09 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Christensen19d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Christensen19e,
  author       = {Chris Christensen},
  title        = {Review of The Cypher Bureau by Eilidh McGinness},
  journal      = {Cryptologia},
  volume       = {43},
  number       = {6},
  pages        = {539--541},
  year         = {2019},
  url          = {https://doi.org/10.1080/01611194.2019.1623937},
  doi          = {10.1080/01611194.2019.1623937},
  timestamp    = {Wed, 09 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Christensen19e.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Christensen19f,
  author       = {Chris Christensen},
  title        = {Review of X, {Y} {\&} {Z} by Dermot Turing},
  journal      = {Cryptologia},
  volume       = {43},
  number       = {6},
  pages        = {542--544},
  year         = {2019},
  url          = {https://doi.org/10.1080/01611194.2019.1623938},
  doi          = {10.1080/01611194.2019.1623938},
  timestamp    = {Wed, 09 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Christensen19f.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/ChristensenAS19,
  author       = {Chris Christensen and
                  Jared Antrobus and
                  Edward Simpson},
  title        = {Aligning {JN-25} messages in depth using weights when the code groups
                  scan},
  journal      = {Cryptologia},
  volume       = {43},
  number       = {2},
  pages        = {84--137},
  year         = {2019},
  url          = {https://doi.org/10.1080/01611194.2018.1528311},
  doi          = {10.1080/01611194.2018.1528311},
  timestamp    = {Mon, 14 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/ChristensenAS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/ClaytonG19,
  author       = {Mike Clayton and
                  John Gallehawk},
  title        = {Letter repeats in Enigma ciphertext produced by same-letter keying},
  journal      = {Cryptologia},
  volume       = {43},
  number       = {5},
  pages        = {438--457},
  year         = {2019},
  url          = {https://doi.org/10.1080/01611194.2019.1565108},
  doi          = {10.1080/01611194.2019.1565108},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/ClaytonG19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/CourtoisGS19,
  author       = {Nicolas T. Courtois and
                  Marios Georgiou and
                  Matteo Scarlata},
  title        = {Slide attacks and LC-weak keys in {T-310}},
  journal      = {Cryptologia},
  volume       = {43},
  number       = {3},
  pages        = {175--189},
  year         = {2019},
  url          = {https://doi.org/10.1080/01611194.2018.1548392},
  doi          = {10.1080/01611194.2018.1548392},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/CourtoisGS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/CourtoisOS19,
  author       = {Nicolas T. Courtois and
                  Maria{-}Bristena Oprisanu and
                  Klaus Schmeh},
  title        = {Linear cryptanalysis and block cipher design in East Germany in the
                  1970s},
  journal      = {Cryptologia},
  volume       = {43},
  number       = {1},
  pages        = {2--22},
  year         = {2019},
  url          = {https://doi.org/10.1080/01611194.2018.1483981},
  doi          = {10.1080/01611194.2018.1483981},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/CourtoisOS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Dooley19,
  author       = {John F. Dooley},
  title        = {The Beale ciphers in fiction},
  journal      = {Cryptologia},
  volume       = {43},
  number       = {4},
  pages        = {344--358},
  year         = {2019},
  url          = {https://doi.org/10.1080/01611194.2018.1550691},
  doi          = {10.1080/01611194.2018.1550691},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Dooley19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Dooley19a,
  author       = {John F. Dooley},
  title        = {Review of 3 Ciphers by Carol Ritz},
  journal      = {Cryptologia},
  volume       = {43},
  number       = {6},
  pages        = {551--552},
  year         = {2019},
  url          = {https://doi.org/10.1080/01611194.2019.1629676},
  doi          = {10.1080/01611194.2019.1629676},
  timestamp    = {Wed, 09 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Dooley19a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/GorodilovaACGIK19,
  author       = {Anastasiya Gorodilova and
                  Sergey Agievich and
                  Claude Carlet and
                  Evgeny Gorkunov and
                  Valeriya Idrisova and
                  Nikolay Kolomeec and
                  Alexandr Kutsenko and
                  Svetla Nikova and
                  Alexey Oblaukhov and
                  Stjepan Picek and
                  Bart Preneel and
                  Vincent Rijmen and
                  Natalia N. Tokareva},
  title        = {Problems and solutions from the fourth International Students' Olympiad
                  in Cryptography {(NSUCRYPTO)}},
  journal      = {Cryptologia},
  volume       = {43},
  number       = {2},
  pages        = {138--174},
  year         = {2019},
  url          = {https://doi.org/10.1080/01611194.2018.1517834},
  doi          = {10.1080/01611194.2018.1517834},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/GorodilovaACGIK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/GrosekAF19,
  author       = {Otokar Grosek and
                  Eugen Antal and
                  Tom{\'{a}}s Fabsic},
  title        = {Remarks on breaking the Vigen{\`{e}}re autokey cipher},
  journal      = {Cryptologia},
  volume       = {43},
  number       = {6},
  pages        = {486--496},
  year         = {2019},
  url          = {https://doi.org/10.1080/01611194.2019.1596997},
  doi          = {10.1080/01611194.2019.1596997},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/GrosekAF19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/KalitaTM19,
  author       = {Manashee Kalita and
                  Themrichon Tuithung and
                  Swanirbhar Majumder},
  title        = {An adaptive color image steganography method using adjacent pixel
                  value differencing and {LSB} substitution technique},
  journal      = {Cryptologia},
  volume       = {43},
  number       = {5},
  pages        = {414--437},
  year         = {2019},
  url          = {https://doi.org/10.1080/01611194.2019.1579122},
  doi          = {10.1080/01611194.2019.1579122},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/KalitaTM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/KishoreR19,
  author       = {Neha Kishore and
                  Priya Raina},
  title        = {Parallel cryptographic hashing: Developments in the last 25 years},
  journal      = {Cryptologia},
  volume       = {43},
  number       = {6},
  pages        = {504--535},
  year         = {2019},
  url          = {https://doi.org/10.1080/01611194.2019.1609130},
  doi          = {10.1080/01611194.2019.1609130},
  timestamp    = {Sat, 12 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/KishoreR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/LasryKW19,
  author       = {George Lasry and
                  Nils Kopal and
                  Arno Wacker},
  title        = {Cryptanalysis of Enigma double indicators with hill climbing},
  journal      = {Cryptologia},
  volume       = {43},
  number       = {4},
  pages        = {267--292},
  year         = {2019},
  url          = {https://doi.org/10.1080/01611194.2018.1551253},
  doi          = {10.1080/01611194.2018.1551253},
  timestamp    = {Mon, 14 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/LasryKW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/MaitraGM19,
  author       = {Tanmoy Maitra and
                  Debasis Giri and
                  Ram N. Mohapatra},
  title        = {{SAS-SIP:} {A} secure authentication scheme based on {ECC} and a fuzzy
                  extractor for session initiation protocol},
  journal      = {Cryptologia},
  volume       = {43},
  number       = {3},
  pages        = {212--232},
  year         = {2019},
  url          = {https://doi.org/10.1080/01611194.2018.1548391},
  doi          = {10.1080/01611194.2018.1548391},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/MaitraGM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/MathivananGV19,
  author       = {P. Mathivanan and
                  A. Balaji Ganesh and
                  R. Venkatesan},
  title        = {{QR} code-based {ECG} signal encryption/decryption algorithm},
  journal      = {Cryptologia},
  volume       = {43},
  number       = {3},
  pages        = {233--253},
  year         = {2019},
  url          = {https://doi.org/10.1080/01611194.2018.1549122},
  doi          = {10.1080/01611194.2018.1549122},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/MathivananGV19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/OmraniRB19,
  author       = {Tasnime Omrani and
                  Rhouma Rhouma and
                  Rabei Becheikh},
  title        = {{LICID:} a lightweight image cryptosystem for IoT devices},
  journal      = {Cryptologia},
  volume       = {43},
  number       = {4},
  pages        = {313--343},
  year         = {2019},
  url          = {https://doi.org/10.1080/01611194.2018.1563009},
  doi          = {10.1080/01611194.2018.1563009},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/OmraniRB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Peinado19,
  author       = {Alberto Peinado},
  title        = {Reconstruction of a 1940 Spanish strip cipher by means of a cyclic
                  rotation model applied to encrypted telegrams},
  journal      = {Cryptologia},
  volume       = {43},
  number       = {1},
  pages        = {47--64},
  year         = {2019},
  url          = {https://doi.org/10.1080/01611194.2018.1522678},
  doi          = {10.1080/01611194.2018.1522678},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Peinado19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Roberto19,
  author       = {R. Narv{\'{a}}ez Roberto},
  title        = {Review of Mensajes secretos. La historia de la criptograf{\'{\i}}a
                  Espa{\~{n}}ola desde sus inicios hasta los a{\~{n}}os 50 (Secret Messages.
                  The History of Spanish Cryptography from its beginnings until the
                  1950s) by Soler Fuensanta, Jos{\'{e}} Ram{\'{o}}n, and Francisco
                  Javier L{\'{o}}pez-Brea Eespiau},
  journal      = {Cryptologia},
  volume       = {43},
  number       = {6},
  pages        = {545--550},
  year         = {2019},
  url          = {https://doi.org/10.1080/01611194.2019.1609131},
  doi          = {10.1080/01611194.2019.1609131},
  timestamp    = {Wed, 09 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Roberto19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/ShermanGLGKMRST19,
  author       = {Alan T. Sherman and
                  Enis Golaszewski and
                  Edward LaFemina and
                  Ethan Goldschen and
                  Mohammed Khan and
                  Lauren Mundy and
                  Mykah Rather and
                  Bryan Solis and
                  Wubnyonga Tete and
                  Edwin Valdez and
                  Brian Weber and
                  Damian Doyle and
                  Casey O'Brien and
                  Linda Oliva and
                  Joseph Roundy and
                  Jack Suess},
  title        = {The {SFS} summer research study at {UMBC:} Project-based learning
                  inspires cybersecurity students},
  journal      = {Cryptologia},
  volume       = {43},
  number       = {4},
  pages        = {293--312},
  year         = {2019},
  url          = {https://doi.org/10.1080/01611194.2018.1557298},
  doi          = {10.1080/01611194.2018.1557298},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/ShermanGLGKMRST19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/SmithP19,
  author       = {Emma May Smith and
                  Marco Ponzi},
  title        = {Glyph combinations across word breaks in the Voynich manuscript},
  journal      = {Cryptologia},
  volume       = {43},
  number       = {6},
  pages        = {466--485},
  year         = {2019},
  url          = {https://doi.org/10.1080/01611194.2019.1596998},
  doi          = {10.1080/01611194.2019.1596998},
  timestamp    = {Wed, 09 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/SmithP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Tomokiyo19,
  author       = {Satoshi Tomokiyo},
  title        = {Identifying Italian ciphers from continuous-figure ciphertexts {(1593)}},
  journal      = {Cryptologia},
  volume       = {43},
  number       = {1},
  pages        = {23--46},
  year         = {2019},
  url          = {https://doi.org/10.1080/01611194.2018.1503207},
  doi          = {10.1080/01611194.2018.1503207},
  timestamp    = {Mon, 14 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Tomokiyo19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Tuncer19,
  author       = {T{\"{u}}rker Tuncer},
  title        = {Block-based fuzzy-image authentication method},
  journal      = {Cryptologia},
  volume       = {43},
  number       = {5},
  pages        = {391--413},
  year         = {2019},
  url          = {https://doi.org/10.1080/01611194.2019.1582117},
  doi          = {10.1080/01611194.2019.1582117},
  timestamp    = {Fri, 06 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Tuncer19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/X19,
  title        = {2019 Symposium on Cryptologic History},
  journal      = {Cryptologia},
  volume       = {43},
  number       = {1},
  pages        = {1},
  year         = {2019},
  url          = {https://www.tandfonline.com/doi/full/10.1080/01611194.2019.1531593},
  doi          = {10.1080/01611194.2019.1531593},
  timestamp    = {Fri, 07 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/X19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Anderson18,
  author       = {Deborah Anderson},
  title        = {Review of Code Girls: The untold story of the American women code
                  breakers of World War {II} by Liza Mundy},
  journal      = {Cryptologia},
  volume       = {42},
  number       = {3},
  pages        = {258--261},
  year         = {2018},
  url          = {https://doi.org/10.1080/01611194.2018.1428837},
  doi          = {10.1080/01611194.2018.1428837},
  timestamp    = {Fri, 13 Apr 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Anderson18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Biermann18,
  author       = {Norbert Biermann},
  title        = {Analysis of Giouan Battista Bellaso's cipher challenges of 1555},
  journal      = {Cryptologia},
  volume       = {42},
  number       = {5},
  pages        = {381--407},
  year         = {2018},
  url          = {https://doi.org/10.1080/01611194.2017.1422050},
  doi          = {10.1080/01611194.2017.1422050},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Biermann18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Bonavoglia18,
  author       = {Paolo Bonavoglia},
  title        = {A 1916 World War {I} notebook of Luigi Sacco},
  journal      = {Cryptologia},
  volume       = {42},
  number       = {3},
  pages        = {205--221},
  year         = {2018},
  url          = {https://doi.org/10.1080/01611194.2017.1362064},
  doi          = {10.1080/01611194.2017.1362064},
  timestamp    = {Fri, 13 Apr 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Bonavoglia18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Christensen18,
  author       = {Chris Christensen},
  title        = {Review of Code Breaking in the Pacific by Peter Donovan and John Mack},
  journal      = {Cryptologia},
  volume       = {42},
  number       = {3},
  pages        = {271--273},
  year         = {2018},
  url          = {https://doi.org/10.1080/01611194.2018.1435206},
  doi          = {10.1080/01611194.2018.1435206},
  timestamp    = {Thu, 29 Mar 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Christensen18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Christensen18a,
  author       = {Chris Christensen},
  title        = {Review of The Mathematics of Secrets by Joshua Holden},
  journal      = {Cryptologia},
  volume       = {42},
  number       = {3},
  pages        = {274--277},
  year         = {2018},
  url          = {https://doi.org/10.1080/01611194.2018.1435209},
  doi          = {10.1080/01611194.2018.1435209},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Christensen18a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Christensen18b,
  author       = {Chris Christensen},
  title        = {Review of The New Codebreakers edited by P. Ryan, D. Naccache, and
                  {J.-J.} Quisquater},
  journal      = {Cryptologia},
  volume       = {42},
  number       = {3},
  pages        = {278--283},
  year         = {2018},
  url          = {https://doi.org/10.1080/01611194.2018.1435211},
  doi          = {10.1080/01611194.2018.1435211},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Christensen18b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Christensen18c,
  author       = {Chris Christensen},
  title        = {Review of Working on the Dark Side of the Moon: Life Inside the National
                  Security Agency by Thomas Reed Willemain},
  journal      = {Cryptologia},
  volume       = {42},
  number       = {4},
  pages        = {378--380},
  year         = {2018},
  url          = {https://doi.org/10.1080/01611194.2018.1449148},
  doi          = {10.1080/01611194.2018.1449148},
  timestamp    = {Wed, 27 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Christensen18c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Christensen18d,
  author       = {Chris Christensen},
  title        = {Review of Lorenz and comments on the work of William Tutte},
  journal      = {Cryptologia},
  volume       = {42},
  number       = {5},
  pages        = {445--466},
  year         = {2018},
  url          = {https://doi.org/10.1080/01611194.2018.1435216},
  doi          = {10.1080/01611194.2018.1435216},
  timestamp    = {Mon, 27 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Christensen18d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Christensen18e,
  author       = {Chris Christensen},
  title        = {Review of {A} Grand Gossip: The Bletchley Park Diary of Basil Cottle
                  edited by James and Judith Hodsdon},
  journal      = {Cryptologia},
  volume       = {42},
  number       = {6},
  pages        = {540--543},
  year         = {2018},
  url          = {https://doi.org/10.1080/01611194.2018.1449149},
  doi          = {10.1080/01611194.2018.1449149},
  timestamp    = {Fri, 28 Sep 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Christensen18e.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Christensen18f,
  author       = {Chris Christensen},
  title        = {Review of {TICOM:} The Hunt for Hitler's Codebreakers by Randy Rezabek},
  journal      = {Cryptologia},
  volume       = {42},
  number       = {6},
  pages        = {544--547},
  year         = {2018},
  url          = {https://doi.org/10.1080/01611194.2018.1449150},
  doi          = {10.1080/01611194.2018.1449150},
  timestamp    = {Fri, 28 Sep 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Christensen18f.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Courtois18,
  author       = {Nicolas T. Courtois},
  title        = {Decryption oracle slide attacks on {T-310}},
  journal      = {Cryptologia},
  volume       = {42},
  number       = {3},
  pages        = {191--204},
  year         = {2018},
  url          = {https://doi.org/10.1080/01611194.2017.1362062},
  doi          = {10.1080/01611194.2017.1362062},
  timestamp    = {Fri, 17 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Courtois18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/CourtoisDS18,
  author       = {Nicolas T. Courtois and
                  J{\"{o}}rg Drobick and
                  Klaus Schmeh},
  title        = {Feistel ciphers in East Germany in the communist era},
  journal      = {Cryptologia},
  volume       = {42},
  number       = {5},
  pages        = {427--444},
  year         = {2018},
  url          = {https://doi.org/10.1080/01611194.2018.1428835},
  doi          = {10.1080/01611194.2018.1428835},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/CourtoisDS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/CourtoisO18,
  author       = {Nicolas T. Courtois and
                  Maria{-}Bristena Oprisanu},
  title        = {Ciphertext-only attacks and weak long-term keys in {T-310}},
  journal      = {Cryptologia},
  volume       = {42},
  number       = {4},
  pages        = {316--336},
  year         = {2018},
  url          = {https://doi.org/10.1080/01611194.2017.1362065},
  doi          = {10.1080/01611194.2017.1362065},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/CourtoisO18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Dooley18,
  author       = {John F. Dooley},
  title        = {Review of {A} Mind at Play by Jimmy Soni and Rob Goodman},
  journal      = {Cryptologia},
  volume       = {42},
  number       = {2},
  pages        = {183--190},
  year         = {2018},
  url          = {https://doi.org/10.1080/01611194.2017.1422052},
  doi          = {10.1080/01611194.2017.1422052},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Dooley18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Erskine18,
  author       = {Ralph Erskine},
  title        = {Review of The Hidden History of Bletchley Park: {A} Social and Organisational
                  History, 1939-1945 by Christopher Smith},
  journal      = {Cryptologia},
  volume       = {42},
  number       = {3},
  pages        = {262--264},
  year         = {2018},
  url          = {https://doi.org/10.1080/01611194.2018.1435208},
  doi          = {10.1080/01611194.2018.1435208},
  timestamp    = {Thu, 29 Mar 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Erskine18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Joyner18,
  author       = {David Joyner},
  title        = {Review of {A} Life in Code by Stuart G. Smith and The Woman Who Smashed
                  Codes by Jason Fagone},
  journal      = {Cryptologia},
  volume       = {42},
  number       = {3},
  pages        = {254--257},
  year         = {2018},
  url          = {https://doi.org/10.1080/01611194.2018.1435215},
  doi          = {10.1080/01611194.2018.1435215},
  timestamp    = {Thu, 29 Mar 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Joyner18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/KiralyT18,
  author       = {Levente Zolt{\'{a}}n Kir{\'{a}}ly and
                  G{\'{a}}bor Tokai},
  title        = {Cracking the code of the Rohonc Codex},
  journal      = {Cryptologia},
  volume       = {42},
  number       = {4},
  pages        = {285--315},
  year         = {2018},
  url          = {https://doi.org/10.1080/01611194.2018.1449147},
  doi          = {10.1080/01611194.2018.1449147},
  timestamp    = {Wed, 27 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/KiralyT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kuzuoglu18,
  author       = {Ulug Kuzuoglu},
  title        = {Chinese cryptography: The Chinese Nationalist Party and intelligence
                  management, 1927-1949},
  journal      = {Cryptologia},
  volume       = {42},
  number       = {6},
  pages        = {514--539},
  year         = {2018},
  url          = {https://doi.org/10.1080/01611194.2018.1449146},
  doi          = {10.1080/01611194.2018.1449146},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kuzuoglu18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/LasryKW18,
  author       = {George Lasry and
                  Nils Kopal and
                  Arno Wacker},
  title        = {Ciphertext-only cryptanalysis of short Hagelin {M-209} ciphertexts},
  journal      = {Cryptologia},
  volume       = {42},
  number       = {6},
  pages        = {485--513},
  year         = {2018},
  url          = {https://doi.org/10.1080/01611194.2018.1428836},
  doi          = {10.1080/01611194.2018.1428836},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/LasryKW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Marks18,
  author       = {Philip Marks},
  title        = {Mr. Twinn's bombes},
  journal      = {Cryptologia},
  volume       = {42},
  number       = {1},
  pages        = {1--80},
  year         = {2018},
  url          = {https://doi.org/10.1080/01611194.2016.1257525},
  doi          = {10.1080/01611194.2016.1257525},
  timestamp    = {Tue, 06 Feb 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Marks18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/McDevittLG18,
  author       = {Tim McDevitt and
                  Jessica Lehr and
                  Ting Gu},
  title        = {A parallel time-memory tradeoff attack on the Hill cipher},
  journal      = {Cryptologia},
  volume       = {42},
  number       = {5},
  pages        = {408--426},
  year         = {2018},
  url          = {https://doi.org/10.1080/01611194.2017.1422051},
  doi          = {10.1080/01611194.2017.1422051},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/McDevittLG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Mishra18,
  author       = {Dheerendra Mishra},
  title        = {Efficient and secure two-factor dynamic ID-based password authentication
                  scheme with provable security},
  journal      = {Cryptologia},
  volume       = {42},
  number       = {2},
  pages        = {146--175},
  year         = {2018},
  url          = {https://doi.org/10.1080/01611194.2017.1325787},
  doi          = {10.1080/01611194.2017.1325787},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Mishra18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/MishraKPS18,
  author       = {Prasanna Raghaw Mishra and
                  Yogesh Kumar and
                  N. Rajesh Pillai and
                  Rajendra Kumar Sharma},
  title        = {On non-linearity and affine equivalence of permutations over an arbitrary
                  finite commutative ring with unity},
  journal      = {Cryptologia},
  volume       = {42},
  number       = {1},
  pages        = {81--94},
  year         = {2018},
  url          = {https://doi.org/10.1080/01611194.2017.1325788},
  doi          = {10.1080/01611194.2017.1325788},
  timestamp    = {Fri, 06 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/MishraKPS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/MoufekG18,
  author       = {Hamza Moufek and
                  Kenza Guenda},
  title        = {A New variant of the McEliece cryptosystem based on the Smith form
                  of convolutional codes},
  journal      = {Cryptologia},
  volume       = {42},
  number       = {3},
  pages        = {227--239},
  year         = {2018},
  url          = {https://doi.org/10.1080/01611194.2017.1362061},
  doi          = {10.1080/01611194.2017.1362061},
  timestamp    = {Fri, 13 Apr 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/MoufekG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Nedved18,
  author       = {Gregory J. Nedved},
  title        = {The Sino-Japanese War of 1894-1895: Partially decrypted},
  journal      = {Cryptologia},
  volume       = {42},
  number       = {2},
  pages        = {95--105},
  year         = {2018},
  url          = {https://doi.org/10.1080/01611194.2017.1385672},
  doi          = {10.1080/01611194.2017.1385672},
  timestamp    = {Thu, 29 Mar 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Nedved18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Schmeh18,
  author       = {Klaus Schmeh},
  title        = {Review of the 3rd European Historical Ciphers Colloquium in Smolenice,
                  Slovakia},
  journal      = {Cryptologia},
  volume       = {42},
  number       = {2},
  pages        = {176--182},
  year         = {2018},
  url          = {https://doi.org/10.1080/01611194.2017.1422049},
  doi          = {10.1080/01611194.2017.1422049},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Schmeh18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Schmeh18a,
  author       = {Klaus Schmeh},
  title        = {Review of The Voynich Manuscript by Raymond Clemens and The Voynich
                  Manuscript: The world's most Mysterious and Esoteric Codex by Stephen
                  Skinner},
  journal      = {Cryptologia},
  volume       = {42},
  number       = {3},
  pages        = {265--270},
  year         = {2018},
  url          = {https://doi.org/10.1080/01611194.2018.1435196},
  doi          = {10.1080/01611194.2018.1435196},
  timestamp    = {Thu, 29 Mar 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Schmeh18a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Shaffer18,
  author       = {Ryan Shaffer},
  title        = {Spies and signals intelligence in the early cold war},
  journal      = {Cryptologia},
  volume       = {42},
  number       = {3},
  pages        = {241--253},
  year         = {2018},
  url          = {https://doi.org/10.1080/01611194.2018.1435213},
  doi          = {10.1080/01611194.2018.1435213},
  timestamp    = {Fri, 13 Apr 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Shaffer18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/ShermanDNOPSHT18,
  author       = {Alan T. Sherman and
                  David DeLatte and
                  Michael Neary and
                  Linda Oliva and
                  Dhananjay S. Phatak and
                  Travis Scheponik and
                  Geoffrey L. Herman and
                  Julia Thompson},
  title        = {Cybersecurity: Exploring core concepts through six scenarios},
  journal      = {Cryptologia},
  volume       = {42},
  number       = {4},
  pages        = {337--377},
  year         = {2018},
  url          = {https://doi.org/10.1080/01611194.2017.1362063},
  doi          = {10.1080/01611194.2017.1362063},
  timestamp    = {Tue, 10 Jul 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/ShermanDNOPSHT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Stallings18,
  author       = {William Stallings},
  title        = {The offset codebook {(OCB)} block cipher mode of operation for authenticated
                  encryption},
  journal      = {Cryptologia},
  volume       = {42},
  number       = {2},
  pages        = {135--145},
  year         = {2018},
  url          = {https://doi.org/10.1080/01611194.2017.1422048},
  doi          = {10.1080/01611194.2017.1422048},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Stallings18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Strasser18,
  author       = {Gerhard F. Strasser},
  title        = {Review of Versteckte Botschaften. Die faszinierende Geschichte der
                  Steganografie. 2., aktualisierte und erweiterte Auflage (Hidden Messages.
                  The Fascinating Story of Steganography. 2nd, updated and expanded
                  edition) by Klaus Schmeh},
  journal      = {Cryptologia},
  volume       = {42},
  number       = {5},
  pages        = {467--475},
  year         = {2018},
  url          = {https://doi.org/10.1080/01611194.2018.1435207},
  doi          = {10.1080/01611194.2018.1435207},
  timestamp    = {Mon, 27 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Strasser18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Tomokiyo18,
  author       = {Satoshi Tomokiyo},
  title        = {How {I} reconstructed a Spanish cipher from 1591},
  journal      = {Cryptologia},
  volume       = {42},
  number       = {6},
  pages        = {477--484},
  year         = {2018},
  url          = {https://doi.org/10.1080/01611194.2017.1370038},
  doi          = {10.1080/01611194.2017.1370038},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Tomokiyo18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/VazquezJ18,
  author       = {Manuel V{\'{a}}zquez and
                  Paz Jim{\'{e}}nez{-}Seral},
  title        = {Recovering the military Enigma using permutations - filling in the
                  details of Rejewski's solution},
  journal      = {Cryptologia},
  volume       = {42},
  number       = {2},
  pages        = {106--134},
  year         = {2018},
  url          = {https://doi.org/10.1080/01611194.2016.1257522},
  doi          = {10.1080/01611194.2016.1257522},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/VazquezJ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Wright18,
  author       = {John Wright},
  title        = {Rejewski's equations: Solving for the entry permutation},
  journal      = {Cryptologia},
  volume       = {42},
  number       = {3},
  pages        = {222--226},
  year         = {2018},
  url          = {https://doi.org/10.1080/01611194.2017.1362066},
  doi          = {10.1080/01611194.2017.1362066},
  timestamp    = {Thu, 29 Mar 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Wright18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/X18,
  title        = {Corrections to "Review of The Triumph of Zygalski's Sheets: The Polish
                  Enigma in the Early 1940s, " 2017. Cryptologia 41(3): 283-285},
  journal      = {Cryptologia},
  volume       = {42},
  number       = {3},
  pages        = {240},
  year         = {2018},
  url          = {https://doi.org/10.1080/01611194.2018.1435205},
  doi          = {10.1080/01611194.2018.1435205},
  timestamp    = {Thu, 29 Mar 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/X18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/X18a,
  title        = {Editorial Board {EOV}},
  journal      = {Cryptologia},
  volume       = {42},
  number       = {6},
  year         = {2018},
  url          = {https://doi.org/10.1080/01611194.2018.1472455},
  doi          = {10.1080/01611194.2018.1472455},
  timestamp    = {Fri, 28 Sep 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/X18a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/AgievichGIKST17,
  author       = {Sergey Agievich and
                  Anastasiya Gorodilova and
                  Valeriya Idrisova and
                  Nikolay Kolomeec and
                  George Shushuev and
                  Natalia N. Tokareva},
  title        = {Mathematical problems of the Second International Students' Olympiad
                  in Cryptography},
  journal      = {Cryptologia},
  volume       = {41},
  number       = {6},
  pages        = {534--565},
  year         = {2017},
  url          = {https://doi.org/10.1080/01611194.2016.1260666},
  doi          = {10.1080/01611194.2016.1260666},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/AgievichGIKST17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/AlexanderGJPS17,
  author       = {John Alexander and
                  John Gallehawk and
                  John Jackson and
                  Allen Pearce and
                  Edward Simpson},
  title        = {A German machine for differencing and testing additives},
  journal      = {Cryptologia},
  volume       = {41},
  number       = {3},
  pages        = {269--280},
  year         = {2017},
  url          = {https://doi.org/10.1080/01611194.2017.1289718},
  doi          = {10.1080/01611194.2017.1289718},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/AlexanderGJPS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/BultelDLM17,
  author       = {Xavier Bultel and
                  Jannik Dreier and
                  Pascal Lafourcade and
                  Malika More},
  title        = {How to explain modern security concepts to your children},
  journal      = {Cryptologia},
  volume       = {41},
  number       = {5},
  pages        = {422--447},
  year         = {2017},
  url          = {https://doi.org/10.1080/01611194.2016.1238422},
  doi          = {10.1080/01611194.2016.1238422},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/BultelDLM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Bury17,
  author       = {Jan Bury},
  title        = {Lambda: {A} Cold War Polish line encryptor and the networks it served},
  journal      = {Cryptologia},
  volume       = {41},
  number       = {6},
  pages        = {512--533},
  year         = {2017},
  url          = {https://doi.org/10.1080/01611194.2017.1357983},
  doi          = {10.1080/01611194.2017.1357983},
  timestamp    = {Thu, 15 Feb 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Bury17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Christensen17,
  author       = {Chris Christensen},
  title        = {Review of The {SIGABA/ECM} {II} Cipher Machine: "A Beautiful Idea"
                  by Timothy J. Mucklow},
  journal      = {Cryptologia},
  volume       = {41},
  number       = {1},
  pages        = {81--84},
  year         = {2017},
  url          = {https://doi.org/10.1080/01611194.2016.1236634},
  doi          = {10.1080/01611194.2016.1236634},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Christensen17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Christensen17a,
  author       = {Chris Christensen},
  title        = {Review of The Neglected Giant: Agnes Meyer Driscoll by K. Johnson},
  journal      = {Cryptologia},
  volume       = {41},
  number       = {1},
  pages        = {85--89},
  year         = {2017},
  url          = {https://doi.org/10.1080/01611194.2016.1236643},
  doi          = {10.1080/01611194.2016.1236643},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Christensen17a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Christensen17b,
  author       = {Chris Christensen},
  title        = {Review of An Introduction to Number Theory with Cryptography by James
                  S. Kraft and Lawrence Washington},
  journal      = {Cryptologia},
  volume       = {41},
  number       = {1},
  pages        = {90--91},
  year         = {2017},
  url          = {https://doi.org/10.1080/01611194.2016.1236629},
  doi          = {10.1080/01611194.2016.1236629},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Christensen17b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Christensen17c,
  author       = {Chris Christensen},
  title        = {Review of The Imitation Game},
  journal      = {Cryptologia},
  volume       = {41},
  number       = {2},
  pages        = {178--181},
  year         = {2017},
  url          = {https://doi.org/10.1080/01611194.2016.1236639},
  doi          = {10.1080/01611194.2016.1236639},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Christensen17c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Christensen17d,
  author       = {Chris Christensen},
  title        = {Review of Demystifying the Bombe by Dermot Turing},
  journal      = {Cryptologia},
  volume       = {41},
  number       = {2},
  pages        = {182--183},
  year         = {2017},
  url          = {https://doi.org/10.1080/01611194.2016.1236632},
  doi          = {10.1080/01611194.2016.1236632},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Christensen17d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Christensen17e,
  author       = {Chris Christensen},
  title        = {Review of The Mathematics of Encryption: An Elementary Introduction
                  by M. Cozzens and S. Miller},
  journal      = {Cryptologia},
  volume       = {41},
  number       = {2},
  pages        = {190--194},
  year         = {2017},
  url          = {https://doi.org/10.1080/01611194.2016.1236642},
  doi          = {10.1080/01611194.2016.1236642},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Christensen17e.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Christensen17f,
  author       = {Chris Christensen},
  title        = {A comment on a book review},
  journal      = {Cryptologia},
  volume       = {41},
  number       = {3},
  pages        = {281--282},
  year         = {2017},
  url          = {https://doi.org/10.1080/01611194.2016.1236627},
  doi          = {10.1080/01611194.2016.1236627},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Christensen17f.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Christensen17g,
  author       = {Chris Christensen},
  title        = {Review of The Triumph of Zygalski's Sheets: The Polish Enigma in the
                  Early 1940 by Zdzis{\l}aw J. Kapera},
  journal      = {Cryptologia},
  volume       = {41},
  number       = {3},
  pages        = {283--285},
  year         = {2017},
  url          = {https://doi.org/10.1080/01611194.2016.1236646},
  doi          = {10.1080/01611194.2016.1236646},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Christensen17g.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Christensen17h,
  author       = {Chris Christensen},
  title        = {Review of {SIGINT:} The Secret History of Signals Intelligence 1914-1945
                  by Peter Matthews},
  journal      = {Cryptologia},
  volume       = {41},
  number       = {3},
  pages        = {286--287},
  year         = {2017},
  url          = {https://doi.org/10.1080/01611194.2016.1236637},
  doi          = {10.1080/01611194.2016.1236637},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Christensen17h.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Christensen17i,
  author       = {Chris Christensen},
  title        = {Review of Bletchley Park: The Secret Archives by Sinclair McKay},
  journal      = {Cryptologia},
  volume       = {41},
  number       = {3},
  pages        = {288},
  year         = {2017},
  url          = {https://doi.org/10.1080/01611194.2016.1236644},
  doi          = {10.1080/01611194.2016.1236644},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Christensen17i.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Christensen17j,
  author       = {Chris Christensen},
  title        = {The evolving relationship between mathematics and cryptology, 1951-1952:
                  {SCAG} and the beginnings of {SCAMP} and {NSASAB}},
  journal      = {Cryptologia},
  volume       = {41},
  number       = {4},
  pages        = {329--387},
  year         = {2017},
  url          = {https://doi.org/10.1080/01611194.2016.1219788},
  doi          = {10.1080/01611194.2016.1219788},
  timestamp    = {Tue, 18 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Christensen17j.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Christensen17k,
  author       = {Chris Christensen},
  title        = {Review of Silence Means Security: Secrets of a {WWII} Code-Breaking
                  {WAC} by B. Nicodemus},
  journal      = {Cryptologia},
  volume       = {41},
  number       = {5},
  pages        = {479--480},
  year         = {2017},
  url          = {https://doi.org/10.1080/01611194.2017.1326272},
  doi          = {10.1080/01611194.2017.1326272},
  timestamp    = {Mon, 27 Nov 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Christensen17k.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Christensen17l,
  author       = {Chris Christensen},
  title        = {Review of Code Warriors: NSA's Codebreakers and the Secret Intelligence
                  War against the Soviet Union by S. Budiansky},
  journal      = {Cryptologia},
  volume       = {41},
  number       = {5},
  pages        = {481--484},
  year         = {2017},
  url          = {https://doi.org/10.1080/01611194.2017.1326794},
  doi          = {10.1080/01611194.2017.1326794},
  timestamp    = {Mon, 27 Nov 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Christensen17l.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/EchardG17,
  author       = {Jean{-}Philippe {\'{E}}chard and
                  Pierrick Gaudry},
  title        = {A harmonious encoding of instrument values by a nineteenth-century
                  Parisian violin dealer},
  journal      = {Cryptologia},
  volume       = {41},
  number       = {5},
  pages        = {448--458},
  year         = {2017},
  url          = {https://doi.org/10.1080/01611194.2016.1257524},
  doi          = {10.1080/01611194.2016.1257524},
  timestamp    = {Thu, 28 Dec 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/EchardG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Ehme17,
  author       = {Jeffrey Ehme},
  title        = {A joy to review: Two books about primes and factoring},
  journal      = {Cryptologia},
  volume       = {41},
  number       = {1},
  pages        = {97--100},
  year         = {2017},
  url          = {https://doi.org/10.1080/01611194.2016.1236625},
  doi          = {10.1080/01611194.2016.1236625},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Ehme17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Hamer17,
  author       = {David H. Hamer},
  title        = {Review of The Secret World by Hugh Trevor-Roper},
  journal      = {Cryptologia},
  volume       = {41},
  number       = {2},
  pages        = {184--185},
  year         = {2017},
  url          = {https://doi.org/10.1080/01611194.2016.1236623},
  doi          = {10.1080/01611194.2016.1236623},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Hamer17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Hamer17a,
  author       = {David H. Hamer},
  title        = {Review of Solving Enigma's Secrets by John Jackson},
  journal      = {Cryptologia},
  volume       = {41},
  number       = {2},
  pages        = {186--189},
  year         = {2017},
  url          = {https://doi.org/10.1080/01611194.2016.1236619},
  doi          = {10.1080/01611194.2016.1236619},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Hamer17a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/HieuK17,
  author       = {Duong Hieu Phan and
                  Neal Koblitz},
  title        = {Cryptography during the French and American Wars in Vietnam},
  journal      = {Cryptologia},
  volume       = {41},
  number       = {6},
  pages        = {491--511},
  year         = {2017},
  url          = {https://doi.org/10.1080/01611194.2017.1292825},
  doi          = {10.1080/01611194.2017.1292825},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/HieuK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Landwehr17,
  author       = {Dominik Landwehr},
  title        = {Review of Simpliciana: Schriften der Grimmelshausen Gesellschaft 2014},
  journal      = {Cryptologia},
  volume       = {41},
  number       = {1},
  pages        = {92--96},
  year         = {2017},
  url          = {https://doi.org/10.1080/01611194.2016.1236628},
  doi          = {10.1080/01611194.2016.1236628},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Landwehr17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/LasryNKW17,
  author       = {George Lasry and
                  Ingo Niebel and
                  Nils Kopal and
                  Arno Wacker},
  title        = {Deciphering {ADFGVX} messages from the Eastern Front of World War
                  {I}},
  journal      = {Cryptologia},
  volume       = {41},
  number       = {2},
  pages        = {101--136},
  year         = {2017},
  url          = {https://doi.org/10.1080/01611194.2016.1169461},
  doi          = {10.1080/01611194.2016.1169461},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/LasryNKW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/MeyerV17,
  author       = {Lauren De Meyer and
                  Serge Vaudenay},
  title        = {{DES} S-box generator},
  journal      = {Cryptologia},
  volume       = {41},
  number       = {2},
  pages        = {153--171},
  year         = {2017},
  url          = {https://doi.org/10.1080/01611194.2016.1169456},
  doi          = {10.1080/01611194.2016.1169456},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/MeyerV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/OstwaldW17,
  author       = {Olaf Ostwald and
                  Frode Weierud},
  title        = {Modern breaking of Enigma ciphertexts},
  journal      = {Cryptologia},
  volume       = {41},
  number       = {5},
  pages        = {395--421},
  year         = {2017},
  url          = {https://doi.org/10.1080/01611194.2016.1238423},
  doi          = {10.1080/01611194.2016.1238423},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/OstwaldW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/RuggT17,
  author       = {Gordon Rugg and
                  Gavin Taylor},
  title        = {Hoaxing statistical features of the Voynich Manuscript},
  journal      = {Cryptologia},
  volume       = {41},
  number       = {3},
  pages        = {247--268},
  year         = {2017},
  url          = {https://doi.org/10.1080/01611194.2016.1206753},
  doi          = {10.1080/01611194.2016.1206753},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/RuggT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Schmeh17,
  author       = {Klaus Schmeh},
  title        = {Review of the 15th {NSA} Cryptologic History Symposium},
  journal      = {Cryptologia},
  volume       = {41},
  number       = {1},
  pages        = {73--80},
  year         = {2017},
  url          = {https://doi.org/10.1080/01611194.2016.1169460},
  doi          = {10.1080/01611194.2016.1169460},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Schmeh17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Schmeh17a,
  author       = {Klaus Schmeh},
  title        = {Review of the 2nd Historical Ciphers Colloquium in Kassel, Germany},
  journal      = {Cryptologia},
  volume       = {41},
  number       = {2},
  pages        = {172--177},
  year         = {2017},
  url          = {https://doi.org/10.1080/01611194.2016.1219787},
  doi          = {10.1080/01611194.2016.1219787},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Schmeh17a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Schmeh17b,
  author       = {Klaus Schmeh},
  title        = {Review of Unsolved: The History and Mystery of the World's Greatest
                  Ciphers from Ancient Egypt to Online Secret Societies by Craig Bauer},
  journal      = {Cryptologia},
  volume       = {41},
  number       = {5},
  pages        = {485--490},
  year         = {2017},
  url          = {https://doi.org/10.1080/01611194.2017.1346339},
  doi          = {10.1080/01611194.2017.1346339},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Schmeh17b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Sherman17,
  author       = {David Sherman},
  title        = {The National Security Agency and the William F. Friedman Collection},
  journal      = {Cryptologia},
  volume       = {41},
  number       = {3},
  pages        = {195--238},
  year         = {2017},
  url          = {https://doi.org/10.1080/01611194.2016.1169458},
  doi          = {10.1080/01611194.2016.1169458},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Sherman17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/ShermanSKN17,
  author       = {Alan T. Sherman and
                  John Seymour and
                  Akshayraj Kore and
                  William Newton},
  title        = {Chaum's protocol for detecting man-in-the-middle: Explanation, demonstration,
                  and timing studies for a text-messaging scenario},
  journal      = {Cryptologia},
  volume       = {41},
  number       = {1},
  pages        = {29--54},
  year         = {2017},
  url          = {https://doi.org/10.1080/01611194.2015.1135487},
  doi          = {10.1080/01611194.2015.1135487},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/ShermanSKN17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Smith17,
  author       = {G. Stuart Smith},
  title        = {Elizebeth Friedman's security and career concerns prior to World War
                  {II}},
  journal      = {Cryptologia},
  volume       = {41},
  number       = {3},
  pages        = {239--246},
  year         = {2017},
  url          = {https://doi.org/10.1080/01611194.2016.1257523},
  doi          = {10.1080/01611194.2016.1257523},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Smith17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Smoot17,
  author       = {Betsy Rohaly Smoot},
  title        = {National Security Agency releases Army Security Agency histories covering
                  1945-1963},
  journal      = {Cryptologia},
  volume       = {41},
  number       = {5},
  pages        = {476--478},
  year         = {2017},
  url          = {https://doi.org/10.1080/01611194.2017.1325789},
  doi          = {10.1080/01611194.2017.1325789},
  timestamp    = {Thu, 28 Dec 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Smoot17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Stallings17,
  author       = {William Stallings},
  title        = {Format-preserving encryption: Overview and {NIST} specification},
  journal      = {Cryptologia},
  volume       = {41},
  number       = {2},
  pages        = {137--152},
  year         = {2017},
  url          = {https://doi.org/10.1080/01611194.2016.1169457},
  doi          = {10.1080/01611194.2016.1169457},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Stallings17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Varga17,
  author       = {Charles Varga},
  title        = {Is Zendia the Isle of Pines?},
  journal      = {Cryptologia},
  volume       = {41},
  number       = {4},
  pages        = {388--394},
  year         = {2017},
  url          = {https://doi.org/10.1080/01611194.2017.1327698},
  doi          = {10.1080/01611194.2017.1327698},
  timestamp    = {Tue, 18 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Varga17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/VobbilisettyTLV17,
  author       = {Rohit Vobbilisetty and
                  Fabio Di Troia and
                  Richard M. Low and
                  Corrado Aaron Visaggio and
                  Mark Stamp},
  title        = {Classic cryptanalysis using hidden Markov models},
  journal      = {Cryptologia},
  volume       = {41},
  number       = {1},
  pages        = {1--28},
  year         = {2017},
  url          = {https://doi.org/10.1080/01611194.2015.1126660},
  doi          = {10.1080/01611194.2015.1126660},
  timestamp    = {Mon, 13 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/VobbilisettyTLV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Wieczorek17,
  author       = {Rafal Wieczorek},
  title        = {Putative duplication glyph in the rongorongo script},
  journal      = {Cryptologia},
  volume       = {41},
  number       = {1},
  pages        = {55--72},
  year         = {2017},
  url          = {https://doi.org/10.1080/01611194.2016.1196052},
  doi          = {10.1080/01611194.2016.1196052},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Wieczorek17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/WolfG17,
  author       = {Gunnar E. Wolf and
                  Gina Gallegos{-}Garc{\'{\i}}a},
  title        = {Strengthening a curated web of trust in a geographically distributed
                  project},
  journal      = {Cryptologia},
  volume       = {41},
  number       = {5},
  pages        = {459--475},
  year         = {2017},
  url          = {https://doi.org/10.1080/01611194.2016.1238421},
  doi          = {10.1080/01611194.2016.1238421},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/WolfG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Wright17,
  author       = {John Wright},
  title        = {The Turing Bombe Victory and the first naval Enigma decrypts},
  journal      = {Cryptologia},
  volume       = {41},
  number       = {4},
  pages        = {295--328},
  year         = {2017},
  url          = {https://doi.org/10.1080/01611194.2016.1219786},
  doi          = {10.1080/01611194.2016.1219786},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Wright17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/X17,
  title        = {David Hamer, family man and enigma expert, remembered and missed},
  journal      = {Cryptologia},
  volume       = {41},
  number       = {4},
  pages        = {289--294},
  year         = {2017},
  url          = {https://doi.org/10.1080/01611194.2017.1343556},
  doi          = {10.1080/01611194.2017.1343556},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/X17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/X17a,
  title        = {Editorial Board {EOV}},
  journal      = {Cryptologia},
  volume       = {41},
  number       = {6},
  year         = {2017},
  url          = {https://doi.org/10.1080/01611194.2017.1403537},
  doi          = {10.1080/01611194.2017.1403537},
  timestamp    = {Tue, 06 Feb 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/X17a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Bauer16,
  author       = {Craig Bauer},
  title        = {Review of \emph{Unveiling the Mystic Ciphers} by Dave Ramsden},
  journal      = {Cryptologia},
  volume       = {40},
  number       = {4},
  pages        = {399--401},
  year         = {2016},
  url          = {https://doi.org/10.1080/01611194.2016.1159476},
  doi          = {10.1080/01611194.2016.1159476},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Bauer16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/BauerLM16,
  author       = {Craig Bauer and
                  Gregory Link and
                  Dante Molle},
  title        = {James Sanborn's Kryptos and the matrix encryption conjecture},
  journal      = {Cryptologia},
  volume       = {40},
  number       = {6},
  pages        = {541--552},
  year         = {2016},
  url          = {https://doi.org/10.1080/01611194.2016.1141556},
  doi          = {10.1080/01611194.2016.1141556},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/BauerLM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Boklan16,
  author       = {Kent D. Boklan},
  title        = {How {I} deciphered a Robert E. Lee letter - and a note on the power
                  of context in short polyalphabetic ciphers},
  journal      = {Cryptologia},
  volume       = {40},
  number       = {5},
  pages        = {406--410},
  year         = {2016},
  url          = {https://doi.org/10.1080/01611194.2016.1170424},
  doi          = {10.1080/01611194.2016.1170424},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Boklan16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/BonavogliaP16,
  author       = {Paolo Bonavoglia and
                  Consolato Pellegrino},
  title        = {The last poem of Pietro Giannone - finally decrypted},
  journal      = {Cryptologia},
  volume       = {40},
  number       = {5},
  pages        = {411--427},
  year         = {2016},
  url          = {https://doi.org/10.1080/01611194.2015.1087072},
  doi          = {10.1080/01611194.2015.1087072},
  timestamp    = {Mon, 05 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/BonavogliaP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Bury16,
  author       = {Jan Bury},
  title        = {Operation "Zachod": Sex, lies, and ciphers},
  journal      = {Cryptologia},
  volume       = {40},
  number       = {2},
  pages        = {113--140},
  year         = {2016},
  url          = {https://doi.org/10.1080/01611194.2015.1113830},
  doi          = {10.1080/01611194.2015.1113830},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Bury16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Christensen16,
  author       = {Chris Christensen},
  title        = {A review of three books about the women of Bletchley Park},
  journal      = {Cryptologia},
  volume       = {40},
  number       = {5},
  pages        = {469--476},
  year         = {2016},
  url          = {https://doi.org/10.1080/01611194.2016.1159477},
  doi          = {10.1080/01611194.2016.1159477},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Christensen16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Christensen16a,
  author       = {Chris Christensen},
  title        = {Companion review of Prof: Alan Turing Decoded by Dermot Turing},
  journal      = {Cryptologia},
  volume       = {40},
  number       = {6},
  pages        = {556--562},
  year         = {2016},
  url          = {https://doi.org/10.1080/01611194.2016.1236633},
  doi          = {10.1080/01611194.2016.1236633},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Christensen16a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Christensen16b,
  author       = {Chris Christensen},
  title        = {Review of Codes, Ciphers and Spies: Tales of Military Intelligence
                  in World War {I} by John F. Dooley},
  journal      = {Cryptologia},
  volume       = {40},
  number       = {6},
  pages        = {563--566},
  year         = {2016},
  url          = {https://doi.org/10.1080/01611194.2016.1236631},
  doi          = {10.1080/01611194.2016.1236631},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Christensen16b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Christensen16c,
  author       = {Chris Christensen},
  title        = {Review of {U.S.} Navy Codebreakers, Linguists, and Intelligence Officers
                  against Japan, 1910-1941 by Steven E. Maffeo},
  journal      = {Cryptologia},
  volume       = {40},
  number       = {6},
  pages        = {567--569},
  year         = {2016},
  url          = {https://doi.org/10.1080/01611194.2016.1236648},
  doi          = {10.1080/01611194.2016.1236648},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Christensen16c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Dooley16,
  author       = {John F. Dooley},
  title        = {Review of \emph{Prisoners, Lovers, {\&} Spies} by Kristie Macrakis},
  journal      = {Cryptologia},
  volume       = {40},
  number       = {1},
  pages        = {107--112},
  year         = {2016},
  url          = {https://doi.org/10.1080/01611194.2015.1028684},
  doi          = {10.1080/01611194.2015.1028684},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Dooley16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/FuensantaP16,
  author       = {Jos{\'{e}} Ram{\'{o}}n Soler Fuensanta and
                  Vicente Guasch Portas},
  title        = {States by secrecy: Cryptography and guerrillas in the Spanish Civil
                  War},
  journal      = {Cryptologia},
  volume       = {40},
  number       = {2},
  pages        = {203--214},
  year         = {2016},
  url          = {https://doi.org/10.1080/01611194.2015.1028687},
  doi          = {10.1080/01611194.2015.1028687},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/FuensantaP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Girard16,
  author       = {Daniel J. Girard},
  title        = {Breaking "\emph{Tirpitz}": Cryptanalysis of the Japanese-German joint
                  naval cipher},
  journal      = {Cryptologia},
  volume       = {40},
  number       = {5},
  pages        = {428--451},
  year         = {2016},
  url          = {https://doi.org/10.1080/01611194.2015.1087073},
  doi          = {10.1080/01611194.2015.1087073},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Girard16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/GoodmanD16,
  author       = {Michael Goodman and
                  Huw Dylan},
  title        = {British Intelligence and the Fear of a Soviet Attack on Allied Communications},
  journal      = {Cryptologia},
  volume       = {40},
  number       = {1},
  pages        = {15--32},
  year         = {2016},
  url          = {https://doi.org/10.1080/01611194.2015.1028686},
  doi          = {10.1080/01611194.2015.1028686},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/GoodmanD16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Hamer16,
  author       = {David H. Hamer},
  title        = {Review of Prof: Alan Turing Decoded by Dermot Turing},
  journal      = {Cryptologia},
  volume       = {40},
  number       = {6},
  pages        = {553--555},
  year         = {2016},
  url          = {https://doi.org/10.1080/01611194.2016.1236620},
  doi          = {10.1080/01611194.2016.1236620},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Hamer16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Hoffman16,
  author       = {Nick Hoffman},
  title        = {Review of \emph{Intercept: The Secret History of Computers and Spies}
                  by Gordon Corera},
  journal      = {Cryptologia},
  volume       = {40},
  number       = {5},
  pages        = {477--480},
  year         = {2016},
  url          = {https://doi.org/10.1080/01611194.2015.1129186},
  doi          = {10.1080/01611194.2015.1129186},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Hoffman16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/HwangG16,
  author       = {Tzonelih Hwang and
                  Prosanta Gope},
  title        = {{RT-OCFB:} Real-Time Based Optimized Cipher Feedback Mode},
  journal      = {Cryptologia},
  volume       = {40},
  number       = {1},
  pages        = {1--14},
  year         = {2016},
  url          = {https://doi.org/10.1080/01611194.2014.988366},
  doi          = {10.1080/01611194.2014.988366},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/HwangG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/HwangG16a,
  author       = {Tzonelih Hwang and
                  Prosanta Gope},
  title        = {PFC-CTR, {PFC-OCB:} Efficient stream cipher modes of authencryption},
  journal      = {Cryptologia},
  volume       = {40},
  number       = {3},
  pages        = {285--302},
  year         = {2016},
  url          = {https://doi.org/10.1080/01611194.2015.1055386},
  doi          = {10.1080/01611194.2015.1055386},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/HwangG16a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kak16,
  author       = {Subhash C. Kak},
  title        = {Simulating entanglement in classical computing for cryptographic applications},
  journal      = {Cryptologia},
  volume       = {40},
  number       = {4},
  pages        = {348--354},
  year         = {2016},
  url          = {https://doi.org/10.1080/01611194.2015.1084959},
  doi          = {10.1080/01611194.2015.1084959},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kak16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/KepleyRS16,
  author       = {Shane Kepley and
                  David Russo and
                  Rainer Steinwandt},
  title        = {Cryptanalysis of a modern rotor machine in a multicast setting},
  journal      = {Cryptologia},
  volume       = {40},
  number       = {6},
  pages        = {515--521},
  year         = {2016},
  url          = {https://doi.org/10.1080/01611194.2015.1115443},
  doi          = {10.1080/01611194.2015.1115443},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/KepleyRS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kollar16,
  author       = {Jozef Koll{\'{a}}r},
  title        = {Soviet {VIC} Cipher: No Respector of Kerckoff's Principles},
  journal      = {Cryptologia},
  volume       = {40},
  number       = {1},
  pages        = {33--48},
  year         = {2016},
  url          = {https://doi.org/10.1080/01611194.2015.1028679},
  doi          = {10.1080/01611194.2015.1028679},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kollar16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/LasryKW16,
  author       = {George Lasry and
                  Nils Kopal and
                  Arno Wacker},
  title        = {Automated Known-Plaintext Cryptanalysis of Short Hagelin {M-209} Messages},
  journal      = {Cryptologia},
  volume       = {40},
  number       = {1},
  pages        = {49--69},
  year         = {2016},
  url          = {https://doi.org/10.1080/01611194.2014.988370},
  doi          = {10.1080/01611194.2014.988370},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/LasryKW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/LasryKW16a,
  author       = {George Lasry and
                  Nils Kopal and
                  Arno Wacker},
  title        = {Ciphertext-only cryptanalysis of Hagelin {M-209} pins and lugs},
  journal      = {Cryptologia},
  volume       = {40},
  number       = {2},
  pages        = {141--176},
  year         = {2016},
  url          = {https://doi.org/10.1080/01611194.2015.1028683},
  doi          = {10.1080/01611194.2015.1028683},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/LasryKW16a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/LasryKW16b,
  author       = {George Lasry and
                  Nils Kopal and
                  Arno Wacker},
  title        = {Cryptanalysis of columnar transposition cipher with long keys},
  journal      = {Cryptologia},
  volume       = {40},
  number       = {4},
  pages        = {374--398},
  year         = {2016},
  url          = {https://doi.org/10.1080/01611194.2015.1087074},
  doi          = {10.1080/01611194.2015.1087074},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/LasryKW16b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/LasryRKW16,
  author       = {George Lasry and
                  Moshe Rubin and
                  Nils Kopal and
                  Arno Wacker},
  title        = {Cryptanalysis of Chaocipher and solution of Exhibit 6},
  journal      = {Cryptologia},
  volume       = {40},
  number       = {6},
  pages        = {487--514},
  year         = {2016},
  url          = {https://doi.org/10.1080/01611194.2015.1091797},
  doi          = {10.1080/01611194.2015.1091797},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/LasryRKW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/LeapMNS16,
  author       = {Tom Leap and
                  Tim McDevitt and
                  Kayla Novak and
                  Nicolette Siermine},
  title        = {Further improvements to the Bauer-Millward attack on the Hill cipher},
  journal      = {Cryptologia},
  volume       = {40},
  number       = {5},
  pages        = {452--468},
  year         = {2016},
  url          = {https://doi.org/10.1080/01611194.2015.1087075},
  doi          = {10.1080/01611194.2015.1087075},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/LeapMNS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/LoebenbergerN16,
  author       = {Daniel Loebenberger and
                  Michael N{\"{u}}sken},
  title        = {Design principles of DES-like ciphers: {A} historical overview},
  journal      = {Cryptologia},
  volume       = {40},
  number       = {3},
  pages        = {221--239},
  year         = {2016},
  url          = {https://doi.org/10.1080/01611194.2015.1028681},
  doi          = {10.1080/01611194.2015.1028681},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/LoebenbergerN16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Narvaez16,
  author       = {Roberto Narv{\'{a}}ez},
  title        = {On the cryptography of James Leander Cathcart {(1767-1843)}},
  journal      = {Cryptologia},
  volume       = {40},
  number       = {4},
  pages        = {316--326},
  year         = {2016},
  url          = {https://doi.org/10.1080/01611194.2015.1055388},
  doi          = {10.1080/01611194.2015.1055388},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Narvaez16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/OstwaldW16,
  author       = {Olaf Ostwald and
                  Frode Weierud},
  title        = {History and Modern Cryptanalysis of Enigma's Pluggable Reflector},
  journal      = {Cryptologia},
  volume       = {40},
  number       = {1},
  pages        = {70--91},
  year         = {2016},
  url          = {https://doi.org/10.1080/01611194.2015.1028682},
  doi          = {10.1080/01611194.2015.1028682},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/OstwaldW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Pommerening16,
  author       = {Klaus Pommerening},
  title        = {Cryptanalysis of nonlinear feedback shift registers},
  journal      = {Cryptologia},
  volume       = {40},
  number       = {4},
  pages        = {303--315},
  year         = {2016},
  url          = {https://doi.org/10.1080/01611194.2015.1055385},
  doi          = {10.1080/01611194.2015.1055385},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Pommerening16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Samuels16,
  author       = {Martin Samuels},
  title        = {Ludwig F{\"{o}}ppl: {A} Bavarian cryptanalyst on the Western
                  front},
  journal      = {Cryptologia},
  volume       = {40},
  number       = {4},
  pages        = {355--373},
  year         = {2016},
  url          = {https://doi.org/10.1080/01611194.2015.1084960},
  doi          = {10.1080/01611194.2015.1084960},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Samuels16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/SanguinoLPEN16,
  author       = {Luis Alberto Benthin Sanguino and
                  Gregor Leander and
                  Christof Paar and
                  Bernhard Esslinger and
                  Ingo Niebel},
  title        = {Analyzing the Spanish strip cipher by combining combinatorial and
                  statistical methods},
  journal      = {Cryptologia},
  volume       = {40},
  number       = {3},
  pages        = {261--284},
  year         = {2016},
  url          = {https://doi.org/10.1080/01611194.2015.1050332},
  doi          = {10.1080/01611194.2015.1050332},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/SanguinoLPEN16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Smoot16,
  author       = {Betsy Rohaly Smoot},
  title        = {Call for papers: 2017 Symposium on Cryptologic History},
  journal      = {Cryptologia},
  volume       = {40},
  number       = {5},
  pages        = {484--485},
  year         = {2016},
  url          = {https://doi.org/10.1080/01611194.2016.1199447},
  doi          = {10.1080/01611194.2016.1199447},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Smoot16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/SmootH16,
  author       = {Betsy Rohaly Smoot and
                  David A. Hatch},
  title        = {Ann Zeilinger Caracristi {(1} February 1921-10 January 2016)},
  journal      = {Cryptologia},
  volume       = {40},
  number       = {5},
  pages        = {403--405},
  year         = {2016},
  url          = {https://doi.org/10.1080/01611194.2016.1169459},
  doi          = {10.1080/01611194.2016.1169459},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/SmootH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Strasser16,
  author       = {Gerhard F. Strasser},
  title        = {Samuel Zimmermann's \emph{Gehaimnussen}: The earliest cryptological
                  book in German},
  journal      = {Cryptologia},
  volume       = {40},
  number       = {3},
  pages        = {240--260},
  year         = {2016},
  url          = {https://doi.org/10.1080/01611194.2015.1093898},
  doi          = {10.1080/01611194.2015.1093898},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Strasser16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Thimbleby16,
  author       = {Harold Thimbleby},
  title        = {Human factors and missed solutions to Enigma design weaknesses},
  journal      = {Cryptologia},
  volume       = {40},
  number       = {2},
  pages        = {177--202},
  year         = {2016},
  url          = {https://doi.org/10.1080/01611194.2015.1028680},
  doi          = {10.1080/01611194.2015.1028680},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Thimbleby16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Visco16,
  author       = {David Visco},
  title        = {Somerton Man times two},
  journal      = {Cryptologia},
  volume       = {40},
  number       = {5},
  pages        = {481--483},
  year         = {2016},
  url          = {https://doi.org/10.1080/01611194.2015.1135649},
  doi          = {10.1080/01611194.2015.1135649},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Visco16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Wik16,
  author       = {Anders Wik},
  title        = {Enigma {Z30} retrieved},
  journal      = {Cryptologia},
  volume       = {40},
  number       = {3},
  pages        = {215--220},
  year         = {2016},
  url          = {https://doi.org/10.1080/01611194.2015.1055387},
  doi          = {10.1080/01611194.2015.1055387},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Wik16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Wright16,
  author       = {John Wright},
  title        = {Rejewski's Test Message as a Crib},
  journal      = {Cryptologia},
  volume       = {40},
  number       = {1},
  pages        = {92--106},
  year         = {2016},
  url          = {https://doi.org/10.1080/01611194.2015.1028685},
  doi          = {10.1080/01611194.2015.1028685},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Wright16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Wright16a,
  author       = {John Wright},
  title        = {A recursive solution for Turing's {H-M} factor},
  journal      = {Cryptologia},
  volume       = {40},
  number       = {4},
  pages        = {327--347},
  year         = {2016},
  url          = {https://doi.org/10.1080/01611194.2015.1062318},
  doi          = {10.1080/01611194.2015.1062318},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Wright16a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/YuZ16,
  author       = {Qian Yu and
                  Chang N. Zhang},
  title        = {A new and fast cryptographic hash function based on {RC4}},
  journal      = {Cryptologia},
  volume       = {40},
  number       = {6},
  pages        = {522--540},
  year         = {2016},
  url          = {https://doi.org/10.1080/01611194.2015.1135486},
  doi          = {10.1080/01611194.2015.1135486},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/YuZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Anderson15,
  author       = {Jeanne Anderson},
  title        = {Kaczynski's Ciphers},
  journal      = {Cryptologia},
  volume       = {39},
  number       = {3},
  pages        = {203--209},
  year         = {2015},
  url          = {https://doi.org/10.1080/01611194.2014.988368},
  doi          = {10.1080/01611194.2014.988368},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Anderson15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/AntalZ15,
  author       = {Eugen Antal and
                  Pavol Zajac},
  title        = {Key Space and Period of Fialka {M-125} Cipher Machine},
  journal      = {Cryptologia},
  volume       = {39},
  number       = {2},
  pages        = {126--144},
  year         = {2015},
  url          = {https://doi.org/10.1080/01611194.2014.915264},
  doi          = {10.1080/01611194.2014.915264},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/AntalZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/BabinkostovaBKW15,
  author       = {Liljana Babinkostova and
                  Alyssa M. Bowden and
                  Andrew M. Kimball and
                  Kameryn J. Williams},
  title        = {A Simplified and Generalized Treatment of DES-Related Ciphers},
  journal      = {Cryptologia},
  volume       = {39},
  number       = {1},
  pages        = {3--24},
  year         = {2015},
  url          = {https://doi.org/10.1080/01611194.2014.915255},
  doi          = {10.1080/01611194.2014.915255},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/BabinkostovaBKW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/BarrS15,
  author       = {Thomas H. Barr and
                  Andrew J. Simoson},
  title        = {Twisting the Keyword Length from a Vigen{\`{e}}re Cipher},
  journal      = {Cryptologia},
  volume       = {39},
  number       = {4},
  pages        = {335--341},
  year         = {2015},
  url          = {https://doi.org/10.1080/01611194.2014.988365},
  doi          = {10.1080/01611194.2014.988365},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/BarrS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Bauer15,
  author       = {Craig Bauer},
  title        = {Friedman Auditorium Times Two},
  journal      = {Cryptologia},
  volume       = {39},
  number       = {2},
  pages        = {173--177},
  year         = {2015},
  url          = {https://doi.org/10.1080/01611194.2015.1009747},
  doi          = {10.1080/01611194.2015.1009747},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Bauer15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Christensen15,
  author       = {Chris Christensen},
  title        = {Review of \emph{The Lost World of Bletchley Park} by Sinclair Mckay},
  journal      = {Cryptologia},
  volume       = {39},
  number       = {1},
  pages        = {99--100},
  year         = {2015},
  url          = {https://doi.org/10.1080/01611194.2014.915689},
  doi          = {10.1080/01611194.2014.915689},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Christensen15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Christensen15a,
  author       = {Chris Christensen},
  title        = {Review of {IEEE} Milestone Award to the Polish Cipher Bureau for "The
                  First Breaking of Enigma Code"},
  journal      = {Cryptologia},
  volume       = {39},
  number       = {2},
  pages        = {178--193},
  year         = {2015},
  url          = {https://doi.org/10.1080/01611194.2015.1009751},
  doi          = {10.1080/01611194.2015.1009751},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Christensen15a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Christensen15b,
  author       = {Chris Christensen},
  title        = {Review of \emph{Marian Rejewski: The Man Who Defeated Enigma} by Zdzis{\l}aw
                  J. Kapera},
  journal      = {Cryptologia},
  volume       = {39},
  number       = {2},
  pages        = {194--197},
  year         = {2015},
  url          = {https://doi.org/10.1080/01611194.2015.1009753},
  doi          = {10.1080/01611194.2015.1009753},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Christensen15b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Christensen15c,
  author       = {Chris Christensen},
  title        = {Review of \emph{Alan Turing: His Work and Impact} Edited by S. Barry
                  Cooper and Jan van Leeuwen},
  journal      = {Cryptologia},
  volume       = {39},
  number       = {2},
  pages        = {198--202},
  year         = {2015},
  url          = {https://doi.org/10.1080/01611194.2015.1009754},
  doi          = {10.1080/01611194.2015.1009754},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Christensen15c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Christensen15d,
  author       = {Chris Christensen},
  title        = {Review of \emph{Blackett's War} by Stephen Budiansky},
  journal      = {Cryptologia},
  volume       = {39},
  number       = {3},
  pages        = {288--290},
  year         = {2015},
  url          = {https://doi.org/10.1080/01611194.2014.915691},
  doi          = {10.1080/01611194.2014.915691},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Christensen15d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Christensen15e,
  author       = {Chris Christensen},
  title        = {Review of \emph{Act of War: Lyndon Johnson, North Korea, and the Capture
                  of the Spy Ship Pueblo} by Jack Cheevers},
  journal      = {Cryptologia},
  volume       = {39},
  number       = {4},
  pages        = {362--372},
  year         = {2015},
  url          = {https://doi.org/10.1080/01611194.2015.1009756},
  doi          = {10.1080/01611194.2015.1009756},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Christensen15e.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Christensen15f,
  author       = {Chris Christensen},
  title        = {Review of \emph{The Riddle of the Labyrinth} by Margalit Fox},
  journal      = {Cryptologia},
  volume       = {39},
  number       = {4},
  pages        = {373--375},
  year         = {2015},
  url          = {https://doi.org/10.1080/01611194.2014.915693},
  doi          = {10.1080/01611194.2014.915693},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Christensen15f.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/ChristensenA15,
  author       = {Chris Christensen and
                  Jared Antrobus},
  title        = {The Story of Mamba: Aligning Messages Against Recovered Additives},
  journal      = {Cryptologia},
  volume       = {39},
  number       = {3},
  pages        = {210--243},
  year         = {2015},
  url          = {https://doi.org/10.1080/01611194.2014.988364},
  doi          = {10.1080/01611194.2014.988364},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/ChristensenA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/CiunguK15,
  author       = {Lavinia Corina Ciungu and
                  David Kahn},
  title        = {A Historical Survey of Romanian Intelligence},
  journal      = {Cryptologia},
  volume       = {39},
  number       = {2},
  pages        = {105--120},
  year         = {2015},
  url          = {https://doi.org/10.1080/01611194.2015.1009746},
  doi          = {10.1080/01611194.2015.1009746},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/CiunguK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Courtois15,
  author       = {Nicolas T. Courtois},
  title        = {On Multiple Symmetric Fixed Points in {GOST}},
  journal      = {Cryptologia},
  volume       = {39},
  number       = {4},
  pages        = {322--334},
  year         = {2015},
  url          = {https://doi.org/10.1080/01611194.2014.988362},
  doi          = {10.1080/01611194.2014.988362},
  timestamp    = {Fri, 17 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Courtois15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/CourtoisMMQS15,
  author       = {Nicolas T. Courtois and
                  Theodosis Mourouzis and
                  Michal Misztal and
                  Jean{-}Jacques Quisquater and
                  Guangyan Song},
  title        = {Can {GOST} Be Made Secure Against Differential Cryptanalysis?},
  journal      = {Cryptologia},
  volume       = {39},
  number       = {2},
  pages        = {145--156},
  year         = {2015},
  url          = {https://doi.org/10.1080/01611194.2014.915266},
  doi          = {10.1080/01611194.2014.915266},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/CourtoisMMQS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Dooley15,
  author       = {John F. Dooley},
  title        = {Review of \emph{George Fabyan} by Richard Munson},
  journal      = {Cryptologia},
  volume       = {39},
  number       = {1},
  pages        = {92--98},
  year         = {2015},
  url          = {https://doi.org/10.1080/01611194.2014.974785},
  doi          = {10.1080/01611194.2014.974785},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Dooley15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/GuGXC15,
  author       = {Haihua Gu and
                  Dawu Gu and
                  WenLu Xie and
                  Ray C. C. Cheung},
  title        = {Efficient Pairing Computation on Huff Curves},
  journal      = {Cryptologia},
  volume       = {39},
  number       = {3},
  pages        = {270--275},
  year         = {2015},
  url          = {https://doi.org/10.1080/01611194.2014.915259},
  doi          = {10.1080/01611194.2014.915259},
  timestamp    = {Mon, 05 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/GuGXC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Hamer15,
  author       = {David H. Hamer},
  title        = {Review of \emph{Gordon Welchman: Bletchley Park's Architect of Ultra
                  Intelligence} by Joel Greenberg},
  journal      = {Cryptologia},
  volume       = {39},
  number       = {1},
  pages        = {101--103},
  year         = {2015},
  url          = {https://doi.org/10.1080/01611194.2015.982933},
  doi          = {10.1080/01611194.2015.982933},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Hamer15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Horng15,
  author       = {Gwoboa Horng},
  title        = {Accelerating {DSA} Signature Generation},
  journal      = {Cryptologia},
  volume       = {39},
  number       = {2},
  pages        = {121--125},
  year         = {2015},
  url          = {https://doi.org/10.1080/01611194.2014.915262},
  doi          = {10.1080/01611194.2014.915262},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Horng15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Konheim15,
  author       = {Alan G. Konheim},
  title        = {The Impetus to Creativity in Technology},
  journal      = {Cryptologia},
  volume       = {39},
  number       = {4},
  pages        = {291--314},
  year         = {2015},
  url          = {https://doi.org/10.1080/01611194.2015.1044816},
  doi          = {10.1080/01611194.2015.1044816},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Konheim15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Lang15,
  author       = {Benedek L{\'{a}}ng},
  title        = {Shame, Love, and Alcohol: Private Ciphers in Early Modern Hungary},
  journal      = {Cryptologia},
  volume       = {39},
  number       = {3},
  pages        = {276--287},
  year         = {2015},
  url          = {https://doi.org/10.1080/01611194.2014.915270},
  doi          = {10.1080/01611194.2014.915270},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Lang15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Leeuw15,
  author       = {Karl de Leeuw},
  title        = {J. F. W. Nuboer and the Reintroduction of Machine Cryptography by
                  the Royal Netherlands Navy, 1915-1940},
  journal      = {Cryptologia},
  volume       = {39},
  number       = {2},
  pages        = {157--172},
  year         = {2015},
  url          = {https://doi.org/10.1080/01611194.2014.915268},
  doi          = {10.1080/01611194.2014.915268},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Leeuw15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Marks15,
  author       = {Philip Marks},
  title        = {Enigma Wiring Data: Interpreting Allied Conventions from World War
                  {II}},
  journal      = {Cryptologia},
  volume       = {39},
  number       = {1},
  pages        = {25--65},
  year         = {2015},
  url          = {https://doi.org/10.1080/01611194.2014.915263},
  doi          = {10.1080/01611194.2014.915263},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Marks15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/MartinezED15,
  author       = {Victor Gayoso Mart{\'{\i}}nez and
                  Luis Hern{\'{a}}ndez Encinas and
                  A. Queiruga Dios},
  title        = {Security and Practical Considerations When Implementing the Elliptic
                  Curve Integrated Encryption Scheme},
  journal      = {Cryptologia},
  volume       = {39},
  number       = {3},
  pages        = {244--269},
  year         = {2015},
  url          = {https://doi.org/10.1080/01611194.2014.988363},
  doi          = {10.1080/01611194.2014.988363},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/MartinezED15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Narvaez15,
  author       = {Roberto Narv{\'{a}}ez},
  title        = {Some Diplomatic Ciphers of the First Mexican Federal Republic {(1824-1830)}},
  journal      = {Cryptologia},
  volume       = {39},
  number       = {1},
  pages        = {66--83},
  year         = {2015},
  url          = {https://doi.org/10.1080/01611194.2014.915267},
  doi          = {10.1080/01611194.2014.915267},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Narvaez15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Schmeh15,
  author       = {Klaus Schmeh},
  title        = {Second Charlotte International Cryptologic Symposium},
  journal      = {Cryptologia},
  volume       = {39},
  number       = {1},
  pages        = {84--91},
  year         = {2015},
  url          = {https://doi.org/10.1080/01611194.2015.974410},
  doi          = {10.1080/01611194.2015.974410},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Schmeh15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Schmeh15a,
  author       = {Klaus Schmeh},
  title        = {Encrypted Books: Mysteries that Fill Hundreds of Pages},
  journal      = {Cryptologia},
  volume       = {39},
  number       = {4},
  pages        = {342--361},
  year         = {2015},
  url          = {https://doi.org/10.1080/01611194.2014.988369},
  doi          = {10.1080/01611194.2014.988369},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Schmeh15a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Smoot15,
  author       = {Betsy Rohaly Smoot},
  title        = {{NSA} Release and Transfer of Records Related to William F. Friedman},
  journal      = {Cryptologia},
  volume       = {39},
  number       = {1},
  pages        = {1--2},
  year         = {2015},
  url          = {https://doi.org/10.1080/01611194.2015.974404},
  doi          = {10.1080/01611194.2015.974404},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Smoot15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Smoot15a,
  author       = {Betsy Rohaly Smoot},
  title        = {Parker Hitt's First Cylinder Device and the Genesis of {U.S.} Army
                  Cylinder and Strip Devices},
  journal      = {Cryptologia},
  volume       = {39},
  number       = {4},
  pages        = {315--321},
  year         = {2015},
  url          = {https://doi.org/10.1080/01611194.2014.988371},
  doi          = {10.1080/01611194.2014.988371},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Smoot15a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/BertoniDPA14,
  author       = {Guido Bertoni and
                  Joan Daemen and
                  Micha{\"{e}}l Peeters and
                  Gilles Van Assche},
  title        = {The Making of {KECCAK}},
  journal      = {Cryptologia},
  volume       = {38},
  number       = {1},
  pages        = {26--60},
  year         = {2014},
  url          = {https://doi.org/10.1080/01611194.2013.856818},
  doi          = {10.1080/01611194.2013.856818},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/BertoniDPA14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Boklan14,
  author       = {Kent D. Boklan},
  title        = {How {I} Decrypted a Confederate Diary - And the Question of the Race
                  of Mrs. Jefferson Davis},
  journal      = {Cryptologia},
  volume       = {38},
  number       = {4},
  pages        = {333--347},
  year         = {2014},
  url          = {https://doi.org/10.1080/01611194.2014.942143},
  doi          = {10.1080/01611194.2014.942143},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Boklan14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Bury14,
  author       = {Jan Bury},
  title        = {Pinpointing the Mark: On the Cold War {SIGINT} Capability},
  journal      = {Cryptologia},
  volume       = {38},
  number       = {2},
  pages        = {147--151},
  year         = {2014},
  url          = {https://doi.org/10.1080/01611194.2014.885802},
  doi          = {10.1080/01611194.2014.885802},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Bury14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/CalofHR14,
  author       = {Jeff Calof and
                  Jeff Hill and
                  Moshe Rubin},
  title        = {Chaocipher Exhibit 5: History, Analysis, and Solution of \emph{Cryptologia}'s
                  1990 Challenge},
  journal      = {Cryptologia},
  volume       = {38},
  number       = {1},
  pages        = {1--25},
  year         = {2014},
  url          = {https://doi.org/10.1080/01611194.2014.856653},
  doi          = {10.1080/01611194.2014.856653},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/CalofHR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/ChangLS14,
  author       = {Kelly Chang and
                  Richard M. Low and
                  Mark Stamp},
  title        = {Cryptanalysis of Typex},
  journal      = {Cryptologia},
  volume       = {38},
  number       = {2},
  pages        = {116--132},
  year         = {2014},
  url          = {https://doi.org/10.1080/01611194.2013.797051},
  doi          = {10.1080/01611194.2013.797051},
  timestamp    = {Mon, 13 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/ChangLS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Christensen14,
  author       = {Chris Christensen},
  title        = {The National Cash Register Company Additive Recovery Machine},
  journal      = {Cryptologia},
  volume       = {38},
  number       = {2},
  pages        = {152--177},
  year         = {2014},
  url          = {https://doi.org/10.1080/01611194.2013.797050},
  doi          = {10.1080/01611194.2013.797050},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Christensen14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Christensen14a,
  author       = {Chris Christensen},
  title        = {Review of \emph{Secret History: The Story of Cryptology} by Craig
                  P. Bauer},
  journal      = {Cryptologia},
  volume       = {38},
  number       = {2},
  pages        = {192--193},
  year         = {2014},
  url          = {https://doi.org/10.1080/01611194.2014.885805},
  doi          = {10.1080/01611194.2014.885805},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Christensen14a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Christensen14b,
  author       = {Chris Christensen},
  title        = {Review of the 2013 Cryptologic History Symposium, \emph{Technological
                  Change and Cryptology: Meeting the Historical Challenge}},
  journal      = {Cryptologia},
  volume       = {38},
  number       = {3},
  pages        = {276--281},
  year         = {2014},
  url          = {https://doi.org/10.1080/01611194.2014.915682},
  doi          = {10.1080/01611194.2014.915682},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Christensen14b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Christensen14c,
  author       = {Chris Christensen},
  title        = {Review of \emph{A Brief History of Cryptology and Cryptographic Algorithms}
                  by John F. Dooley},
  journal      = {Cryptologia},
  volume       = {38},
  number       = {3},
  pages        = {285--286},
  year         = {2014},
  url          = {https://doi.org/10.1080/01611194.2014.915686},
  doi          = {10.1080/01611194.2014.915686},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Christensen14c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Christensen14d,
  author       = {Chris Christensen},
  title        = {Review of \emph{The History of Traffic Analysis: World War {I} - Vietnam}
                  by Donald A. Borrmann et al},
  journal      = {Cryptologia},
  volume       = {38},
  number       = {3},
  pages        = {287--290},
  year         = {2014},
  url          = {https://doi.org/10.1080/01611194.2014.915687},
  doi          = {10.1080/01611194.2014.915687},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Christensen14d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Christensen14e,
  author       = {Chris Christensen},
  title        = {Review of \emph{Bletchley Park: The Code-Breakers of Station X} by
                  Michael Smith},
  journal      = {Cryptologia},
  volume       = {38},
  number       = {3},
  pages        = {291--292},
  year         = {2014},
  url          = {https://doi.org/10.1080/01611194.2014.915688},
  doi          = {10.1080/01611194.2014.915688},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Christensen14e.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Christensen14f,
  author       = {Chris Christensen},
  title        = {Lester Hill Revisited},
  journal      = {Cryptologia},
  volume       = {38},
  number       = {4},
  pages        = {293--332},
  year         = {2014},
  url          = {https://doi.org/10.1080/01611194.2014.915260},
  doi          = {10.1080/01611194.2014.915260},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Christensen14f.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Courtois14,
  author       = {Nicolas T. Courtois},
  title        = {Cryptanalysis of Two {GOST} Variants with 128-Bit Keys},
  journal      = {Cryptologia},
  volume       = {38},
  number       = {4},
  pages        = {348--361},
  year         = {2014},
  url          = {https://doi.org/10.1080/01611194.2014.915706},
  doi          = {10.1080/01611194.2014.915706},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Courtois14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Dooley14,
  author       = {John F. Dooley},
  title        = {Review of \emph{Inferno} by Dan Brown},
  journal      = {Cryptologia},
  volume       = {38},
  number       = {1},
  pages        = {89--92},
  year         = {2014},
  url          = {https://doi.org/10.1080/01611194.2013.856820},
  doi          = {10.1080/01611194.2013.856820},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Dooley14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Dooley14a,
  author       = {John F. Dooley},
  title        = {Review of \emph{Mr. Penumbra's 24-Hour Bookstore} by Robin Sloan},
  journal      = {Cryptologia},
  volume       = {38},
  number       = {1},
  pages        = {93--95},
  year         = {2014},
  url          = {https://doi.org/10.1080/01611194.2013.856819},
  doi          = {10.1080/01611194.2013.856819},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Dooley14a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/DooleyK14,
  author       = {John F. Dooley and
                  Elizabeth Anne King},
  title        = {John Matthews Manly: The \emph{Collier's} Articles},
  journal      = {Cryptologia},
  volume       = {38},
  number       = {1},
  pages        = {77--88},
  year         = {2014},
  url          = {https://doi.org/10.1080/01611194.2013.797049},
  doi          = {10.1080/01611194.2013.797049},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/DooleyK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Grey14,
  author       = {Christopher Grey},
  title        = {From the Archives: Colonel Butler's Satire of Bletchley Park},
  journal      = {Cryptologia},
  volume       = {38},
  number       = {3},
  pages        = {266--275},
  year         = {2014},
  url          = {https://doi.org/10.1080/01611194.2014.915258},
  doi          = {10.1080/01611194.2014.915258},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Grey14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Hamer14,
  author       = {David H. Hamer},
  title        = {Review of \emph{D{\"{o}}nitz, U-Boats, Convoys} by Jak P. Mallmann
                  Showell},
  journal      = {Cryptologia},
  volume       = {38},
  number       = {3},
  pages        = {282--284},
  year         = {2014},
  url          = {https://doi.org/10.1080/01611194.2014.915684},
  doi          = {10.1080/01611194.2014.915684},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Hamer14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/JungY14,
  author       = {Ki{-}Hyun Jung and
                  Kee{-}Young Yoo},
  title        = {Three-Directional Data Hiding Method for Digital Images},
  journal      = {Cryptologia},
  volume       = {38},
  number       = {2},
  pages        = {178--191},
  year         = {2014},
  url          = {https://doi.org/10.1080/01611194.2014.885817},
  doi          = {10.1080/01611194.2014.885817},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/JungY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kahn14,
  author       = {David Kahn},
  title        = {The Naval Intercept Station at Bainbridge Island, Washington},
  journal      = {Cryptologia},
  volume       = {38},
  number       = {3},
  pages        = {244--247},
  year         = {2014},
  url          = {https://doi.org/10.1080/01611194.2014.915677},
  doi          = {10.1080/01611194.2014.915677},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kahn14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/KakP14,
  author       = {Subhash C. Kak and
                  Monisha Prabhu},
  title        = {Cryptographic Applications of Primitive Pythagorean Triples},
  journal      = {Cryptologia},
  volume       = {38},
  number       = {3},
  pages        = {215--222},
  year         = {2014},
  url          = {https://doi.org/10.1080/01611194.2014.915257},
  doi          = {10.1080/01611194.2014.915257},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/KakP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Koss14,
  author       = {Lorelei Koss},
  title        = {Writing and Information Literacy in a Cryptology First-Year Seminar},
  journal      = {Cryptologia},
  volume       = {38},
  number       = {3},
  pages        = {223--231},
  year         = {2014},
  url          = {https://doi.org/10.1080/01611194.2014.915256},
  doi          = {10.1080/01611194.2014.915256},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Koss14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/LasryKW14,
  author       = {George Lasry and
                  Nils Kopal and
                  Arno Wacker},
  title        = {Solving the Double Transposition Challenge with a Divide-and-Conquer
                  Approach},
  journal      = {Cryptologia},
  volume       = {38},
  number       = {3},
  pages        = {197--214},
  year         = {2014},
  url          = {https://doi.org/10.1080/01611194.2014.915269},
  doi          = {10.1080/01611194.2014.915269},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/LasryKW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/ListG14,
  author       = {David List and
                  John Gallehawk},
  title        = {Revelation for Cilli's},
  journal      = {Cryptologia},
  volume       = {38},
  number       = {3},
  pages        = {248--265},
  year         = {2014},
  url          = {https://doi.org/10.1080/01611194.2014.891398},
  doi          = {10.1080/01611194.2014.891398},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/ListG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Rescher14,
  author       = {Nicholas Rescher},
  title        = {Leibniz's \emph{Machina Deciphratoria}: {A} Seventeenth-Century Proto-Enigma},
  journal      = {Cryptologia},
  volume       = {38},
  number       = {2},
  pages        = {103--115},
  year         = {2014},
  url          = {https://doi.org/10.1080/01611194.2014.885789},
  doi          = {10.1080/01611194.2014.885789},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Rescher14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Rezabek14,
  author       = {Randy Rezabek},
  title        = {The Russian Fish with Caviar},
  journal      = {Cryptologia},
  volume       = {38},
  number       = {1},
  pages        = {61--76},
  year         = {2014},
  url          = {https://doi.org/10.1080/01611194.2013.797046},
  doi          = {10.1080/01611194.2013.797046},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Rezabek14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Rocca14,
  author       = {Charles F. Rocca Jr.},
  title        = {Mathematics in the History of Cryptography},
  journal      = {Cryptologia},
  volume       = {38},
  number       = {3},
  pages        = {232--243},
  year         = {2014},
  url          = {https://doi.org/10.1080/01611194.2014.915254},
  doi          = {10.1080/01611194.2014.915254},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Rocca14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Rojas14,
  author       = {Ra{\'{u}}l Rojas},
  title        = {Konrad Zuse's Proposal for a Cipher Machine},
  journal      = {Cryptologia},
  volume       = {38},
  number       = {4},
  pages        = {362--369},
  year         = {2014},
  url          = {https://doi.org/10.1080/01611194.2014.915265},
  doi          = {10.1080/01611194.2014.915265},
  timestamp    = {Mon, 23 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Rojas14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Schwartz14,
  author       = {Kathryn A. Schwartz},
  title        = {From Text to Technological Context: Medieval Arabic Cryptology's Relation
                  to Paper, Numbers, and the Post},
  journal      = {Cryptologia},
  volume       = {38},
  number       = {2},
  pages        = {133--146},
  year         = {2014},
  url          = {https://doi.org/10.1080/01611194.2014.885801},
  doi          = {10.1080/01611194.2014.885801},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Schwartz14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Smoot14,
  author       = {Betsy Rohaly Smoot},
  title        = {Review of \emph{World War {I} and the Origins of {U.S.} Military Intelligence}
                  by James L. Gilbert},
  journal      = {Cryptologia},
  volume       = {38},
  number       = {2},
  pages        = {194--196},
  year         = {2014},
  url          = {https://doi.org/10.1080/01611194.2014.885806},
  doi          = {10.1080/01611194.2014.885806},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Smoot14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Strasser14,
  author       = {Gerhard F. Strasser},
  title        = {Review of \emph{Mechanisches Memorieren und Chiffrieren um 1430}:
                  \emph{Johannes Fontanas Tractatus de instrumentis artis memorie} by
                  Horst Kranz and Walter Oberschelp},
  journal      = {Cryptologia},
  volume       = {38},
  number       = {1},
  pages        = {96--101},
  year         = {2014},
  url          = {https://doi.org/10.1080/01611194.2014.857884},
  doi          = {10.1080/01611194.2014.857884},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Strasser14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/WangD14,
  author       = {Qinglong Wang and
                  Jintai Ding},
  title        = {Cryptanalysis and Improvement of a k-out-of-n Oblivious Transfer Protocol},
  journal      = {Cryptologia},
  volume       = {38},
  number       = {4},
  pages        = {370--376},
  year         = {2014},
  url          = {https://doi.org/10.1080/01611194.2014.915261},
  doi          = {10.1080/01611194.2014.915261},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/WangD14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/AlexanderCWMG13,
  author       = {John Alexander and
                  Kevin Coleman and
                  David White and
                  Nick Miers and
                  John Gallehawk},
  title        = {Whittingham-Collingwood Cipher Machine},
  journal      = {Cryptologia},
  volume       = {37},
  number       = {4},
  pages        = {289--304},
  year         = {2013},
  url          = {https://doi.org/10.1080/01611194.2013.798523},
  doi          = {10.1080/01611194.2013.798523},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/AlexanderCWMG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Anderson13,
  author       = {Jeanne Anderson},
  title        = {Breaking the {BTK} Killer's Cipher},
  journal      = {Cryptologia},
  volume       = {37},
  number       = {3},
  pages        = {204--209},
  year         = {2013},
  url          = {https://doi.org/10.1080/01611194.2013.797047},
  doi          = {10.1080/01611194.2013.797047},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Anderson13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/AziziA13,
  author       = {Abdelmalek Azizi and
                  Mostafa Azizi},
  title        = {Instances of Arabic Cryptography in Morocco {II}},
  journal      = {Cryptologia},
  volume       = {37},
  number       = {4},
  pages        = {328--337},
  year         = {2013},
  url          = {https://doi.org/10.1080/01611194.2013.797042},
  doi          = {10.1080/01611194.2013.797042},
  timestamp    = {Mon, 05 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/AziziA13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/CampbellGS13,
  author       = {Samantha Campbell and
                  Max Grinchenko and
                  William Smith},
  title        = {Linear Cryptanalysis of Simplified {AES} Under Change of S-Box},
  journal      = {Cryptologia},
  volume       = {37},
  number       = {2},
  pages        = {120--138},
  year         = {2013},
  url          = {https://doi.org/10.1080/01611194.2012.660236},
  doi          = {10.1080/01611194.2012.660236},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/CampbellGS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/CamposGLF13,
  author       = {Fco. Alberto Campos and
                  Alberto Gasc{\'{o}}n and
                  Jes{\'{u}}s Mar{\'{\i}}a Latorre and
                  Jos{\'{e}} Ram{\'{o}}n Soler Fuensanta},
  title        = {Genetic Algorithms and Mathematical Programming to Crack the Spanish
                  Strip Cipher},
  journal      = {Cryptologia},
  volume       = {37},
  number       = {1},
  pages        = {51--68},
  year         = {2013},
  url          = {https://doi.org/10.1080/01611194.2012.660235},
  doi          = {10.1080/01611194.2012.660235},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/CamposGLF13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Christensen13,
  author       = {Chris Christensen},
  title        = {Review of \emph{Secret Postings: Bletchley Park to the Pentagon} by
                  Charlott WebbBook Tower Publishing, Redditch, Worcestershire, UK,
                  2011, 72 pages, Paperback, {\textsterling}6.99. {ISBN} 978-0-9557164-1-6},
  journal      = {Cryptologia},
  volume       = {37},
  number       = {1},
  pages        = {99--101},
  year         = {2013},
  url          = {https://doi.org/10.1080/01611194.2012.689598},
  doi          = {10.1080/01611194.2012.689598},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Christensen13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Christensen13a,
  author       = {Chris Christensen},
  title        = {Review of \emph{Introduction to Cryptography with Mathematical Foundations
                  and Computer Implementation} by Alexander StanoyevitchChapman and
                  Hall/CRC, Boca Raton, FL, 2010, 699 pages, Hardcover, {\textdollar}89.95.
                  {ISBN} 1439817634},
  journal      = {Cryptologia},
  volume       = {37},
  number       = {1},
  pages        = {102--104},
  year         = {2013},
  url          = {https://doi.org/10.1080/01611194.2012.689599},
  doi          = {10.1080/01611194.2012.689599},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Christensen13a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Christensen13b,
  author       = {Chris Christensen},
  title        = {Announcement of the 2013 Cryptologic History Symposium "Technological
                  Change and Cryptology: Meeting the Historical Challenges" 17-18 October
                  2013},
  journal      = {Cryptologia},
  volume       = {37},
  number       = {2},
  pages        = {105--106},
  year         = {2013},
  url          = {https://doi.org/10.1080/01611194.2013.767671},
  doi          = {10.1080/01611194.2013.767671},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Christensen13b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Christensen13c,
  author       = {Chris Christensen},
  title        = {Review of \emph{Memories of My Work at the Cipher Bureau of the General
                  Staff Second Department 1930-1945} by Marian Rejewski},
  journal      = {Cryptologia},
  volume       = {37},
  number       = {2},
  pages        = {167--174},
  year         = {2013},
  url          = {https://doi.org/10.1080/01611194.2013.767678},
  doi          = {10.1080/01611194.2013.767678},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Christensen13c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Christensen13d,
  author       = {Chris Christensen},
  title        = {Review of \emph{Decoding Organization: Bletchley Park, Codebreaking
                  and Organization Studies} by Christopher Grey},
  journal      = {Cryptologia},
  volume       = {37},
  number       = {2},
  pages        = {184--188},
  year         = {2013},
  url          = {https://doi.org/10.1080/01611194.2013.767681},
  doi          = {10.1080/01611194.2013.767681},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Christensen13d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Christensen13e,
  author       = {Chris Christensen},
  title        = {Review of \emph{Code Talker} by C. Nez (with J. S. Avila)},
  journal      = {Cryptologia},
  volume       = {37},
  number       = {3},
  pages        = {282--284},
  year         = {2013},
  url          = {https://doi.org/10.1080/01611194.2013.798526},
  doi          = {10.1080/01611194.2013.798526},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Christensen13e.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Christensen13f,
  author       = {Chris Christensen},
  title        = {Review of Two Software-Based Textbooks},
  journal      = {Cryptologia},
  volume       = {37},
  number       = {3},
  pages        = {285--288},
  year         = {2013},
  url          = {https://doi.org/10.1080/01611194.2013.798527},
  doi          = {10.1080/01611194.2013.798527},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Christensen13f.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Christensen13g,
  author       = {Chris Christensen},
  title        = {Review of Biographies of Alan Turing},
  journal      = {Cryptologia},
  volume       = {37},
  number       = {4},
  pages        = {356--367},
  year         = {2013},
  url          = {https://doi.org/10.1080/01611194.2013.827532},
  doi          = {10.1080/01611194.2013.827532},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Christensen13g.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Courtois13,
  author       = {Nicolas T. Courtois},
  title        = {Low-Complexity Key Recovery Attacks on {GOST} Block Cipher},
  journal      = {Cryptologia},
  volume       = {37},
  number       = {1},
  pages        = {1--10},
  year         = {2013},
  url          = {https://doi.org/10.1080/01611194.2012.739587},
  doi          = {10.1080/01611194.2012.739587},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Courtois13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Dang13,
  author       = {Quynh Dang},
  title        = {Changes in Federal Information Processing Standard {(FIPS)} 180-4,
                  Secure Hash Standard},
  journal      = {Cryptologia},
  volume       = {37},
  number       = {1},
  pages        = {69--73},
  year         = {2013},
  url          = {https://doi.org/10.1080/01611194.2012.687431},
  doi          = {10.1080/01611194.2012.687431},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Dang13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/DhavareLS13,
  author       = {Amrapali Dhavare and
                  Richard M. Low and
                  Mark Stamp},
  title        = {Efficient Cryptanalysis of Homophonic Substitution Ciphers},
  journal      = {Cryptologia},
  volume       = {37},
  number       = {3},
  pages        = {250--281},
  year         = {2013},
  url          = {https://doi.org/10.1080/01611194.2013.797041},
  doi          = {10.1080/01611194.2013.797041},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/DhavareLS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Dooley13,
  author       = {John F. Dooley},
  title        = {1929-1931: {A} Transition Period in {U.S.} Cryptologic History},
  journal      = {Cryptologia},
  volume       = {37},
  number       = {1},
  pages        = {84--98},
  year         = {2013},
  url          = {https://doi.org/10.1080/01611194.2012.687432},
  doi          = {10.1080/01611194.2012.687432},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Dooley13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/FlynnM13,
  author       = {William G. Flynn and
                  Sharon Maneki},
  title        = {The Jack Butcher Case: {A} Story of Courage, Commitment, and Concern},
  journal      = {Cryptologia},
  volume       = {37},
  number       = {3},
  pages        = {210--214},
  year         = {2013},
  url          = {https://doi.org/10.1080/01611194.2013.798513},
  doi          = {10.1080/01611194.2013.798513},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/FlynnM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Fronczak13,
  author       = {Maria Fronczak},
  title        = {Atbah-Type Ciphers in the Christian Orient and Numerical Rules in
                  the Construction of Christian Substitution Ciphers},
  journal      = {Cryptologia},
  volume       = {37},
  number       = {4},
  pages        = {338--344},
  year         = {2013},
  url          = {https://doi.org/10.1080/01611194.2013.797040},
  doi          = {10.1080/01611194.2013.797040},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Fronczak13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/FuensantaEB13,
  author       = {Jos{\'{e}} Ram{\'{o}}n Soler Fuensanta and
                  Francisco Javier L{\'{o}}pez{-}Brea Espiau and
                  Diego Navarro Bonilla},
  title        = {Revealing Secrets in Two Wars: The Spanish Codebreakers at {PC} Bruno
                  and {PC} Cadix},
  journal      = {Cryptologia},
  volume       = {37},
  number       = {3},
  pages        = {233--249},
  year         = {2013},
  url          = {https://doi.org/10.1080/01611194.2013.797048},
  doi          = {10.1080/01611194.2013.797048},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/FuensantaEB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Glass13,
  author       = {Darren B. Glass},
  title        = {A First-Year Seminar on Cryptography},
  journal      = {Cryptologia},
  volume       = {37},
  number       = {4},
  pages        = {305--310},
  year         = {2013},
  url          = {https://doi.org/10.1080/01611194.2013.797043},
  doi          = {10.1080/01611194.2013.797043},
  timestamp    = {Tue, 10 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Glass13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Hamer13,
  author       = {David H. Hamer},
  title        = {Review of \emph{Hitler's Codebreakers - German Signals Intelligence
                  in World War 2} by John Jackson},
  journal      = {Cryptologia},
  volume       = {37},
  number       = {4},
  pages        = {368--370},
  year         = {2013},
  url          = {https://doi.org/10.1080/01611194.2013.827533},
  doi          = {10.1080/01611194.2013.827533},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Hamer13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Holden13,
  author       = {Joshua Holden},
  title        = {Demitasse: {A} "Small" Version of the Tiny Encryption Algorithm and
                  Its Use in a Classroom Setting},
  journal      = {Cryptologia},
  volume       = {37},
  number       = {1},
  pages        = {74--83},
  year         = {2013},
  url          = {https://doi.org/10.1080/01611194.2012.660237},
  doi          = {10.1080/01611194.2012.660237},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Holden13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Holden13a,
  author       = {Joshua Holden},
  title        = {A Good Hash Function is Hard to Find, and Vice Versa},
  journal      = {Cryptologia},
  volume       = {37},
  number       = {2},
  pages        = {107--119},
  year         = {2013},
  url          = {https://doi.org/10.1080/01611194.2012.687429},
  doi          = {10.1080/01611194.2012.687429},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Holden13a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Joyner13,
  author       = {David Joyner},
  title        = {Review of \emph{Algebraic Shift Register Sequences} by Mark Goresky
                  and Andrew Klapper},
  journal      = {Cryptologia},
  volume       = {37},
  number       = {2},
  pages        = {175--183},
  year         = {2013},
  url          = {https://doi.org/10.1080/01611194.2013.767680},
  doi          = {10.1080/01611194.2013.767680},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Joyner13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Joyner13a,
  author       = {David Joyner},
  title        = {Review of \emph{Cryptographic Boolean Functions and Applications}
                  by Thomas Cusick and Pantelimon St{\u{a}}nic{\u{a}}},
  journal      = {Cryptologia},
  volume       = {37},
  number       = {2},
  pages        = {189--192},
  year         = {2013},
  url          = {https://doi.org/10.1080/01611194.2013.767683},
  doi          = {10.1080/01611194.2013.767683},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Joyner13a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kelly13,
  author       = {Saul Kelly},
  title        = {Room 47: The Persian Prelude to the Zimmermann Telegram},
  journal      = {Cryptologia},
  volume       = {37},
  number       = {1},
  pages        = {11--50},
  year         = {2013},
  url          = {https://doi.org/10.1080/01611194.2012.739586},
  doi          = {10.1080/01611194.2012.739586},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kelly13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/KumarS13,
  author       = {Sachin Kumar and
                  Rajendra Kumar Sharma},
  title        = {Recursive Information Hiding of Secrets by Random Grids},
  journal      = {Cryptologia},
  volume       = {37},
  number       = {2},
  pages        = {154--161},
  year         = {2013},
  url          = {https://doi.org/10.1080/01611194.2012.739585},
  doi          = {10.1080/01611194.2012.739585},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/KumarS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Leeuw13,
  author       = {Karl de Leeuw},
  title        = {Review of \emph{Forschungsstelle Langeveld: Duits Afluisterstation
                  in bezet Nederland} by Hans Knap},
  journal      = {Cryptologia},
  volume       = {37},
  number       = {2},
  pages        = {162--166},
  year         = {2013},
  url          = {https://doi.org/10.1080/01611194.2013.741460},
  doi          = {10.1080/01611194.2013.741460},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Leeuw13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Mateer13,
  author       = {Todd D. Mateer},
  title        = {Cryptanalysis of Beale Cipher Number Two},
  journal      = {Cryptologia},
  volume       = {37},
  number       = {3},
  pages        = {215--232},
  year         = {2013},
  url          = {https://doi.org/10.1080/01611194.2013.798517},
  doi          = {10.1080/01611194.2013.798517},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Mateer13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Rezabek13,
  author       = {Randy Rezabek},
  title        = {{TICOM} and the Search for OKW/\emph{Chi}},
  journal      = {Cryptologia},
  volume       = {37},
  number       = {2},
  pages        = {139--153},
  year         = {2013},
  url          = {https://doi.org/10.1080/01611194.2012.687430},
  doi          = {10.1080/01611194.2012.687430},
  timestamp    = {Mon, 29 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Rezabek13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Schmeh13,
  author       = {Klaus Schmeh},
  title        = {A Milestone in Voynich Manuscript Research: Voynich 100 Conference
                  in Monte Porzio Catone, Italy},
  journal      = {Cryptologia},
  volume       = {37},
  number       = {3},
  pages        = {193--203},
  year         = {2013},
  url          = {https://doi.org/10.1080/01611194.2013.797045},
  doi          = {10.1080/01611194.2013.797045},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Schmeh13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Stallings13,
  author       = {William Stallings},
  title        = {Digital Signature Algorithms},
  journal      = {Cryptologia},
  volume       = {37},
  number       = {4},
  pages        = {311--327},
  year         = {2013},
  url          = {https://doi.org/10.1080/01611194.2013.797044},
  doi          = {10.1080/01611194.2013.797044},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Stallings13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/SunC13,
  author       = {Da{-}Zhi Sun and
                  Zhen{-}Fu Cao},
  title        = {On the Privacy of Khan et al.'s Dynamic ID-Based Remote Authentication
                  Scheme with User Anonymity},
  journal      = {Cryptologia},
  volume       = {37},
  number       = {4},
  pages        = {345--355},
  year         = {2013},
  url          = {https://doi.org/10.1080/01611194.2013.797039},
  doi          = {10.1080/01611194.2013.797039},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/SunC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/AgardC12,
  author       = {David Agard and
                  Chris Christensen},
  title        = {Review of \emph{The Theory That Would Not Die} by Sharon McGrayne},
  journal      = {Cryptologia},
  volume       = {36},
  number       = {2},
  pages        = {183--190},
  year         = {2012},
  url          = {https://doi.org/10.1080/01611194.2012.661307},
  doi          = {10.1080/01611194.2012.661307},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/AgardC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/BallGHMN12,
  author       = {Matthew V. Ball and
                  Cyril Guyot and
                  James P. Hughes and
                  Luther Martin and
                  Landon Curt Noll},
  title        = {The {XTS-AES} Disk Encryption Algorithm and the Security of Ciphertext
                  Stealing},
  journal      = {Cryptologia},
  volume       = {36},
  number       = {1},
  pages        = {70--79},
  year         = {2012},
  url          = {https://doi.org/10.1080/01611194.2012.635115},
  doi          = {10.1080/01611194.2012.635115},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/BallGHMN12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/BardAC12,
  author       = {Gregory V. Bard and
                  Shaun Van Ault and
                  Nicolas T. Courtois},
  title        = {Statistics of Random Permutations and the Cryptanalysis of Periodic
                  Block Ciphers},
  journal      = {Cryptologia},
  volume       = {36},
  number       = {3},
  pages        = {240--262},
  year         = {2012},
  url          = {https://doi.org/10.1080/01611194.2011.632806},
  doi          = {10.1080/01611194.2011.632806},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/BardAC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Bauer12,
  author       = {Craig Bauer},
  title        = {Space Crunchers and {GOST} Busters!},
  journal      = {Cryptologia},
  volume       = {36},
  number       = {1},
  pages        = {1},
  year         = {2012},
  url          = {https://doi.org/10.1080/01611194.2012.653772},
  doi          = {10.1080/01611194.2012.653772},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Bauer12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Bauer12a,
  author       = {Craig Bauer},
  title        = {100 Years Times Two: Alan Turing and the Voynich Manuscript},
  journal      = {Cryptologia},
  volume       = {36},
  number       = {2},
  pages        = {85--87},
  year         = {2012},
  url          = {https://doi.org/10.1080/01611194.2012.660846},
  doi          = {10.1080/01611194.2012.660846},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Bauer12a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/BeaverB12,
  author       = {Cheryl L. Beaver and
                  Stuart Boersma},
  title        = {{KRYPTOS:} {A} Pacific Northwest Cryptanalysis Contest for Undergraduates},
  journal      = {Cryptologia},
  volume       = {36},
  number       = {2},
  pages        = {149--156},
  year         = {2012},
  url          = {https://doi.org/10.1080/01611194.2012.660238},
  doi          = {10.1080/01611194.2012.660238},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/BeaverB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/BrierFN12,
  author       = {Eric Brier and
                  Wenjie Fang and
                  David Naccache},
  title        = {How to Scatter a Secret?},
  journal      = {Cryptologia},
  volume       = {36},
  number       = {1},
  pages        = {46--54},
  year         = {2012},
  url          = {https://doi.org/10.1080/01611194.2012.635100},
  doi          = {10.1080/01611194.2012.635100},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/BrierFN12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Bury12,
  author       = {Jan Bury},
  title        = {Project Kalina: The Lotos Operation Conundrum},
  journal      = {Cryptologia},
  volume       = {36},
  number       = {2},
  pages        = {119--128},
  year         = {2012},
  url          = {https://doi.org/10.1080/01611194.2012.660854},
  doi          = {10.1080/01611194.2012.660854},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Bury12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Bury12a,
  author       = {Jan Bury},
  title        = {Assembling the Puzzle Game: The Jacek Jurzak Spy Case},
  journal      = {Cryptologia},
  volume       = {36},
  number       = {3},
  pages        = {215--229},
  year         = {2012},
  url          = {https://doi.org/10.1080/01611194.2012.688692},
  doi          = {10.1080/01611194.2012.688692},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Bury12a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Bury12b,
  author       = {Jan Bury},
  title        = {Polish Cold War Codebreaking of 1959-1989: {A} Preliminary Assessment},
  journal      = {Cryptologia},
  volume       = {36},
  number       = {4},
  pages        = {341--379},
  year         = {2012},
  url          = {https://doi.org/10.1080/01611194.2012.713804},
  doi          = {10.1080/01611194.2012.713804},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Bury12b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Christensen12,
  author       = {Chris Christensen},
  title        = {Review of the 2011 Cryptologic History Symposium \emph{Cryptology
                  in War and Peace: Crisis Points in History}},
  journal      = {Cryptologia},
  volume       = {36},
  number       = {2},
  pages        = {157--160},
  year         = {2012},
  url          = {https://doi.org/10.1080/01611194.2012.661296},
  doi          = {10.1080/01611194.2012.661296},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Christensen12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Christensen12a,
  author       = {Chris Christensen},
  title        = {Review of \emph{Secret Days: Code-Breaking in Bletchley Park} by Asa
                  Briggs},
  journal      = {Cryptologia},
  volume       = {36},
  number       = {2},
  pages        = {167--172},
  year         = {2012},
  url          = {https://doi.org/10.1080/01611194.2012.661300},
  doi          = {10.1080/01611194.2012.661300},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Christensen12a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Christensen12b,
  author       = {Chris Christensen},
  title        = {Review of \emph{Neil Webster's Cribs for Victory} edited by Joss Pearson},
  journal      = {Cryptologia},
  volume       = {36},
  number       = {2},
  pages        = {173--175},
  year         = {2012},
  url          = {https://doi.org/10.1080/01611194.2012.661302},
  doi          = {10.1080/01611194.2012.661302},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Christensen12b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Christensen12c,
  author       = {Chris Christensen},
  title        = {Review of \emph{In the Shadow of Pont du Gard: The Polish Enigma in
                  Vichy France (June 1940 to November 1942)} by Zdzislaw J. Kapera},
  journal      = {Cryptologia},
  volume       = {36},
  number       = {2},
  pages        = {176--178},
  year         = {2012},
  url          = {https://doi.org/10.1080/01611194.2012.661303},
  doi          = {10.1080/01611194.2012.661303},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Christensen12c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Christensen12d,
  author       = {Chris Christensen},
  title        = {Review of \emph{Inside Enigma: The Secrets of the Enigma Machine and
                  Other Historic Cipher Machines} by Tom Perera},
  journal      = {Cryptologia},
  volume       = {36},
  number       = {2},
  pages        = {179--180},
  year         = {2012},
  url          = {https://doi.org/10.1080/01611194.2012.661304},
  doi          = {10.1080/01611194.2012.661304},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Christensen12d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Christensen12e,
  author       = {Chris Christensen},
  title        = {Review of \emph{The Information: {A} History, {A} Theory, {A} Flood}
                  by James Gleick},
  journal      = {Cryptologia},
  volume       = {36},
  number       = {2},
  pages        = {181--182},
  year         = {2012},
  url          = {https://doi.org/10.1080/01611194.2012.661306},
  doi          = {10.1080/01611194.2012.661306},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Christensen12e.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/ChristensenJT12,
  author       = {Chris Christensen and
                  David Joyner and
                  Jenna Torres},
  title        = {Lester Hill's Error-Detecting Codes},
  journal      = {Cryptologia},
  volume       = {36},
  number       = {2},
  pages        = {88--103},
  year         = {2012},
  url          = {https://doi.org/10.1080/01611194.2011.632805},
  doi          = {10.1080/01611194.2011.632805},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/ChristensenJT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Courtois12,
  author       = {Nicolas T. Courtois},
  title        = {Security Evaluation of {GOST} 28147-89 in View of International Standardisation},
  journal      = {Cryptologia},
  volume       = {36},
  number       = {1},
  pages        = {2--13},
  year         = {2012},
  url          = {https://doi.org/10.1080/01611194.2011.632807},
  doi          = {10.1080/01611194.2011.632807},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Courtois12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Donovan12,
  author       = {Peter Donovan},
  title        = {The Flaw in the {JN-25} Series of Ciphers, {II}},
  journal      = {Cryptologia},
  volume       = {36},
  number       = {1},
  pages        = {55--61},
  year         = {2012},
  url          = {https://doi.org/10.1080/01611194.2012.635107},
  doi          = {10.1080/01611194.2012.635107},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Donovan12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Dooley12,
  author       = {John F. Dooley},
  title        = {Review of \emph{The Mystic Cipher} by Dennis L. Mangrum},
  journal      = {Cryptologia},
  volume       = {36},
  number       = {1},
  pages        = {80--83},
  year         = {2012},
  url          = {https://doi.org/10.1080/01611194.2012.635117},
  doi          = {10.1080/01611194.2012.635117},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Dooley12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Dooley12a,
  author       = {John F. Dooley},
  title        = {Review of \emph{Joe Rochefort's War} by Elliot Carlson},
  journal      = {Cryptologia},
  volume       = {36},
  number       = {2},
  pages        = {161--163},
  year         = {2012},
  url          = {https://doi.org/10.1080/01611194.2012.660239},
  doi          = {10.1080/01611194.2012.660239},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Dooley12a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/FuensantaEB12,
  author       = {Jos{\'{e}} Ram{\'{o}}n Soler Fuensanta and
                  Francisco Javier L{\'{o}}pez{-}Brea Espiau and
                  Diego Navarro Bonilla},
  title        = {A Cryptanalysis Service During the Spanish Civil War},
  journal      = {Cryptologia},
  volume       = {36},
  number       = {3},
  pages        = {263--289},
  year         = {2012},
  url          = {https://doi.org/10.1080/01611194.2012.687428},
  doi          = {10.1080/01611194.2012.687428},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/FuensantaEB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Hamer12,
  author       = {David H. Hamer},
  title        = {Review of \emph{The Secrets of Station {X} - How the Bletchley Park
                  Codebreakers Helped Win the War} by Michael Smith},
  journal      = {Cryptologia},
  volume       = {36},
  number       = {2},
  pages        = {164--166},
  year         = {2012},
  url          = {https://doi.org/10.1080/01611194.2012.661298},
  doi          = {10.1080/01611194.2012.661298},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Hamer12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Hamer12a,
  author       = {David H. Hamer},
  title        = {First Charlotte International Cryptologic Symposium and Exhibit},
  journal      = {Cryptologia},
  volume       = {36},
  number       = {3},
  pages        = {290--294},
  year         = {2012},
  url          = {https://doi.org/10.1080/01611194.2012.703037},
  doi          = {10.1080/01611194.2012.703037},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Hamer12a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/MinierPP12,
  author       = {Marine Minier and
                  Raphael C.{-}W. Phan and
                  Benjamin Pousse},
  title        = {On Integral Distinguishers of Rijndael Family of Ciphers},
  journal      = {Cryptologia},
  volume       = {36},
  number       = {2},
  pages        = {104--118},
  year         = {2012},
  url          = {https://doi.org/10.1080/01611194.2012.635110},
  doi          = {10.1080/01611194.2012.635110},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/MinierPP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Schmeh12,
  author       = {Klaus Schmeh},
  title        = {The Pathology of Cryptology - {A} Current Survey},
  journal      = {Cryptologia},
  volume       = {36},
  number       = {1},
  pages        = {14--45},
  year         = {2012},
  url          = {https://doi.org/10.1080/01611194.2011.632803},
  doi          = {10.1080/01611194.2011.632803},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Schmeh12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/ShermanPRS12,
  author       = {Alan T. Sherman and
                  Dhananjay S. Phatak and
                  Vivek G. Relan and
                  Bhushan Sonawane},
  title        = {Location Authentication, Tracking, and Emergency Signaling through
                  Power Line Communication: Designs and Protocols for New Out-of-Band
                  Strategies},
  journal      = {Cryptologia},
  volume       = {36},
  number       = {2},
  pages        = {129--148},
  year         = {2012},
  url          = {https://doi.org/10.1080/01611194.2012.660370},
  doi          = {10.1080/01611194.2012.660370},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/ShermanPRS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Shim12,
  author       = {Kyung{-}Ah Shim},
  title        = {Security Flaws in Three Password-Based Remote User Authentication
                  Schemes with Smart Cards},
  journal      = {Cryptologia},
  volume       = {36},
  number       = {1},
  pages        = {62--69},
  year         = {2012},
  url          = {https://doi.org/10.1080/01611194.2011.606352},
  doi          = {10.1080/01611194.2011.606352},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Shim12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Strasser12,
  author       = {Gerhard F. Strasser},
  title        = {Late 18th-Century French Encrypted Diplomatic "Letters of Recommendation"
                  - Or, How to Unwittingly Carry Your Own Warrant},
  journal      = {Cryptologia},
  volume       = {36},
  number       = {3},
  pages        = {230--239},
  year         = {2012},
  url          = {https://doi.org/10.1080/01611194.2012.688694},
  doi          = {10.1080/01611194.2012.688694},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Strasser12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/TuringB12,
  author       = {Alan M. Turing and
                  D. Bayley},
  title        = {Report on Speech Secrecy System DELILAH, a Technical Description Compiled
                  by A. M. Turing and Lieutenant D. Bayley REME, 1945-1946},
  journal      = {Cryptologia},
  volume       = {36},
  number       = {4},
  pages        = {295--340},
  year         = {2012},
  url          = {https://doi.org/10.1080/01611194.2012.713803},
  doi          = {10.1080/01611194.2012.713803},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/TuringB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Zabell12,
  author       = {Sandy L. Zabell},
  title        = {Commentary on Alan M. Turing: The Applications of Probability to Cryptography},
  journal      = {Cryptologia},
  volume       = {36},
  number       = {3},
  pages        = {191--214},
  year         = {2012},
  url          = {https://doi.org/10.1080/01611194.2012.697811},
  doi          = {10.1080/01611194.2012.697811},
  timestamp    = {Mon, 21 Aug 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Zabell12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/AziziA11,
  author       = {Abdelmalek Azizi and
                  Mostafa Azizi},
  title        = {Instances of Arabic Cryptography in Morocco},
  journal      = {Cryptologia},
  volume       = {35},
  number       = {1},
  pages        = {47--57},
  year         = {2011},
  url          = {https://doi.org/10.1080/01611194.2010.509173},
  doi          = {10.1080/01611194.2010.509173},
  timestamp    = {Mon, 05 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/AziziA11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Bellovin11,
  author       = {Steven M. Bellovin},
  title        = {Frank Miller: Inventor of the One-Time Pad},
  journal      = {Cryptologia},
  volume       = {35},
  number       = {3},
  pages        = {203--222},
  year         = {2011},
  url          = {https://doi.org/10.1080/01611194.2011.583711},
  doi          = {10.1080/01611194.2011.583711},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Bellovin11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Bury11,
  author       = {Jan Bury},
  title        = {From the Archives: Breaking {OTP} Ciphers},
  journal      = {Cryptologia},
  volume       = {35},
  number       = {2},
  pages        = {176--188},
  year         = {2011},
  url          = {https://doi.org/10.1080/01611194.2011.571159},
  doi          = {10.1080/01611194.2011.571159},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Bury11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Bury11a,
  author       = {Jan Bury},
  title        = {Operation \emph{Stonka}. An Ultimate Deception Spy Game},
  journal      = {Cryptologia},
  volume       = {35},
  number       = {4},
  pages        = {297--327},
  year         = {2011},
  url          = {https://doi.org/10.1080/01611194.2011.583709},
  doi          = {10.1080/01611194.2011.583709},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Bury11a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Carter11,
  author       = {Frank L. Carter},
  title        = {Keith Batey and John Herivel: Two Distinguished Bletchley Park Cryptographers},
  journal      = {Cryptologia},
  volume       = {35},
  number       = {3},
  pages        = {277--281},
  year         = {2011},
  url          = {https://doi.org/10.1080/01611194.2011.595623},
  doi          = {10.1080/01611194.2011.595623},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Carter11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Child11,
  author       = {Paul W. Child},
  title        = {Cipher against Ciphers: Jonathan Swift's Latino-Anglicus Satire of
                  Medicine},
  journal      = {Cryptologia},
  volume       = {35},
  number       = {3},
  pages        = {257--266},
  year         = {2011},
  url          = {https://doi.org/10.1080/01611194.2011.558608},
  doi          = {10.1080/01611194.2011.558608},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Child11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Christensen11,
  author       = {Chris Christensen},
  title        = {Review of \emph{Cryptography and Network Security: Principles and
                  Practice, Fifth Edition}},
  journal      = {Cryptologia},
  volume       = {35},
  number       = {1},
  pages        = {97--99},
  year         = {2011},
  url          = {https://doi.org/10.1080/01611194.2010.533253},
  doi          = {10.1080/01611194.2010.533253},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Christensen11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Christensen11a,
  author       = {Chris Christensen},
  title        = {Review of \emph{Algebraic Cryptanalysis}},
  journal      = {Cryptologia},
  volume       = {35},
  number       = {1},
  pages        = {100--105},
  year         = {2011},
  url          = {https://doi.org/10.1080/01611194.2010.509282},
  doi          = {10.1080/01611194.2010.509282},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Christensen11a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Christensen11b,
  author       = {Chris Christensen},
  title        = {Review of \emph{Understanding Cryptography}},
  journal      = {Cryptologia},
  volume       = {35},
  number       = {1},
  pages        = {106--107},
  year         = {2011},
  url          = {https://doi.org/10.1080/01611194.2010.509014},
  doi          = {10.1080/01611194.2010.509014},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Christensen11b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Christensen11c,
  author       = {Chris Christensen},
  title        = {Review of \emph{The Secret Life of Bletchley Park: The World War {II}
                  Codebreaking Centre and the Men and Women Who Were There}},
  journal      = {Cryptologia},
  volume       = {35},
  number       = {2},
  pages        = {189--191},
  year         = {2011},
  url          = {https://doi.org/10.1080/01611194.2011.558983},
  doi          = {10.1080/01611194.2011.558983},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Christensen11c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Christensen11d,
  author       = {Chris Christensen},
  title        = {Review of Bletchley Park Trust Reports by Frank Carter},
  journal      = {Cryptologia},
  volume       = {35},
  number       = {2},
  pages        = {192--195},
  year         = {2011},
  url          = {https://doi.org/10.1080/01611194.2011.558984},
  doi          = {10.1080/01611194.2011.558984},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Christensen11d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Christensen11e,
  author       = {Chris Christensen},
  title        = {{US} Navy Cryptologic Mathematicians during World War {II}},
  journal      = {Cryptologia},
  volume       = {35},
  number       = {3},
  pages        = {267--276},
  year         = {2011},
  url          = {https://doi.org/10.1080/01611194.2011.558609},
  doi          = {10.1080/01611194.2011.558609},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Christensen11e.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/ChristensenA11,
  author       = {Chris Christensen and
                  David Agard},
  title        = {William Dean Wray {(1910-1962)} the Evolution of a Cryptanalyst},
  journal      = {Cryptologia},
  volume       = {35},
  number       = {1},
  pages        = {73--96},
  year         = {2011},
  url          = {https://doi.org/10.1080/01611194.2010.485410},
  doi          = {10.1080/01611194.2010.485410},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/ChristensenA11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Das11,
  author       = {Manik Lal Das},
  title        = {A Key Escrow-Free Identity-Based Signature Scheme without using Secure
                  Channel},
  journal      = {Cryptologia},
  volume       = {35},
  number       = {1},
  pages        = {58--72},
  year         = {2011},
  url          = {https://doi.org/10.1080/01611194.2010.515905},
  doi          = {10.1080/01611194.2010.515905},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Das11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Dooley11,
  author       = {John F. Dooley},
  title        = {Was Herbert O. Yardley a Traitor?},
  journal      = {Cryptologia},
  volume       = {35},
  number       = {1},
  pages        = {1--15},
  year         = {2011},
  url          = {https://doi.org/10.1080/01611194.2010.533254},
  doi          = {10.1080/01611194.2010.533254},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Dooley11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/ErtelJHF11,
  author       = {Wolfgang Ertel and
                  Lucia Jans and
                  Walter Herzhauser and
                  Joachim Fessler},
  title        = {An Enigma Replica and its Blueprints},
  journal      = {Cryptologia},
  volume       = {35},
  number       = {1},
  pages        = {16--21},
  year         = {2011},
  url          = {https://doi.org/10.1080/01611194.2010.533256},
  doi          = {10.1080/01611194.2010.533256},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/ErtelJHF11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/HajnyZ11,
  author       = {Jan Hajny and
                  Vaclav Zeman},
  title        = {Anonymous Authentication with Spread Revelation},
  journal      = {Cryptologia},
  volume       = {35},
  number       = {3},
  pages        = {235--246},
  year         = {2011},
  url          = {https://doi.org/10.1080/01611194.2011.584777},
  doi          = {10.1080/01611194.2011.584777},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/HajnyZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Hamer11,
  author       = {David Hamer},
  title        = {The David Kahn Collection at NSA's National Cryptologic Museum},
  journal      = {Cryptologia},
  volume       = {35},
  number       = {2},
  pages        = {110--113},
  year         = {2011},
  url          = {https://doi.org/10.1080/01611194.2011.558980},
  doi          = {10.1080/01611194.2011.558980},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Hamer11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Hamer11a,
  author       = {David Hamer},
  title        = {Review of '\emph{Dilly - The Man Who Broke Enigmas}' by Mavis Batey},
  journal      = {Cryptologia},
  volume       = {35},
  number       = {2},
  pages        = {196--197},
  year         = {2011},
  url          = {https://doi.org/10.1080/01611194.2011.558981},
  doi          = {10.1080/01611194.2011.558981},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Hamer11a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kahn11,
  author       = {David Kahn},
  title        = {Letter to the Editor},
  journal      = {Cryptologia},
  volume       = {35},
  number       = {2},
  pages        = {109},
  year         = {2011},
  url          = {https://doi.org/10.1080/01611194.2011.559803},
  doi          = {10.1080/01611194.2011.559803},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kahn11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kapera11,
  author       = {Zdzislaw J. Kapera},
  title        = {Summary Report of the State of the Soviet Military Sigint in November
                  1942 Noticing "ENIGMA"},
  journal      = {Cryptologia},
  volume       = {35},
  number       = {3},
  pages        = {247--256},
  year         = {2011},
  url          = {https://doi.org/10.1080/01611194.2011.559790},
  doi          = {10.1080/01611194.2011.559790},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kapera11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Lewand11,
  author       = {Robert Edward Lewand},
  title        = {Secret Keeping 101 - Dr. Janice Martin Benario and the Women's College
                  Connection to {ULTRA}},
  journal      = {Cryptologia},
  volume       = {35},
  number       = {1},
  pages        = {42--46},
  year         = {2011},
  url          = {https://doi.org/10.1080/01611194.2010.533255},
  doi          = {10.1080/01611194.2010.533255},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Lewand11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Marks11,
  author       = {Philip Marks},
  title        = {Operational Use and Cryptanalysis of the Kryha Cipher Machine},
  journal      = {Cryptologia},
  volume       = {35},
  number       = {2},
  pages        = {114--155},
  year         = {2011},
  url          = {https://doi.org/10.1080/01611194.2011.558978},
  doi          = {10.1080/01611194.2011.558978},
  timestamp    = {Mon, 29 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Marks11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Patterson11,
  author       = {Wayne Patterson},
  title        = {The Cryptology of Baseball},
  journal      = {Cryptologia},
  volume       = {35},
  number       = {2},
  pages        = {156--163},
  year         = {2011},
  url          = {https://doi.org/10.1080/01611194.2011.558979},
  doi          = {10.1080/01611194.2011.558979},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Patterson11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Preparata11,
  author       = {Franco P. Preparata},
  title        = {Steps Toward Unraveling a Vatican Cipher of the 1930s},
  journal      = {Cryptologia},
  volume       = {35},
  number       = {3},
  pages        = {223--234},
  year         = {2011},
  url          = {https://doi.org/10.1080/01611194.2011.583710},
  doi          = {10.1080/01611194.2011.583710},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Preparata11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Reeds11,
  author       = {Jim Reeds},
  title        = {American Dragon},
  journal      = {Cryptologia},
  volume       = {35},
  number       = {1},
  pages        = {22--41},
  year         = {2011},
  url          = {https://doi.org/10.1080/01611194.2010.509182},
  doi          = {10.1080/01611194.2010.509182},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Reeds11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Rubin11,
  author       = {Moshe Rubin},
  title        = {John F. Byrne's Chaocipher Revealed: An Historical and Technical Appraisal},
  journal      = {Cryptologia},
  volume       = {35},
  number       = {4},
  pages        = {328--379},
  year         = {2011},
  url          = {https://doi.org/10.1080/01611194.2011.606751},
  doi          = {10.1080/01611194.2011.606751},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Rubin11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Smoot11,
  author       = {Betsy Rohaly Smoot},
  title        = {An Accidental Cryptologist: The Brief Career of Genevieve Young Hitt},
  journal      = {Cryptologia},
  volume       = {35},
  number       = {2},
  pages        = {164--175},
  year         = {2011},
  url          = {https://doi.org/10.1080/01611194.2011.558982},
  doi          = {10.1080/01611194.2011.558982},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Smoot11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/AssarpourB10,
  author       = {Ali Assarpour and
                  Kent D. Boklan},
  title        = {How We Broke the Union Code {(148} Years Too Late)},
  journal      = {Cryptologia},
  volume       = {34},
  number       = {3},
  pages        = {200--210},
  year         = {2010},
  url          = {https://doi.org/10.1080/01611194.2010.485435},
  doi          = {10.1080/01611194.2010.485435},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/AssarpourB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Bauer10,
  author       = {Craig P. Bauer},
  title        = {Teamwork Pays Off!},
  journal      = {Cryptologia},
  volume       = {34},
  number       = {4},
  pages        = {281},
  year         = {2010},
  url          = {https://doi.org/10.1080/01611194.2010.509674},
  doi          = {10.1080/01611194.2010.509674},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Bauer10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Booker10,
  author       = {Clyde G. Booker},
  title        = {Review of \emph{West Wind Clear: Cryptology and the Winds Message
                  Controversy - {A} Documentary History}},
  journal      = {Cryptologia},
  volume       = {34},
  number       = {1},
  pages        = {90--95},
  year         = {2010},
  url          = {https://doi.org/10.1080/01611190903409173},
  doi          = {10.1080/01611190903409173},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Booker10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Booker10a,
  author       = {Clyde G. Booker},
  title        = {Review of \emph{The Attack on the Liberty: The Untold Story of Israel's
                  Deadly 1967 Assault on a {U.S.} Spy Ship} by James Scott},
  journal      = {Cryptologia},
  volume       = {34},
  number       = {2},
  pages        = {186--189},
  year         = {2010},
  url          = {https://doi.org/10.1080/01611191003600653},
  doi          = {10.1080/01611191003600653},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Booker10a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Burke10,
  author       = {Colin B. Burke},
  title        = {Review of \emph{The Secret Sentry: The Untold Story of the National
                  Security Agency} by Matthew M. Aid},
  journal      = {Cryptologia},
  volume       = {34},
  number       = {2},
  pages        = {190--193},
  year         = {2010},
  url          = {https://doi.org/10.1080/01611191003621956},
  doi          = {10.1080/01611191003621956},
  timestamp    = {Thu, 03 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Burke10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Burke10a,
  author       = {Colin B. Burke},
  title        = {From the Archives: {A} Lady Codebreaker Speaks: Joan Murray, the Bombes
                  and the Perils of Writing Crypto-History From Participants' Accounts},
  journal      = {Cryptologia},
  volume       = {34},
  number       = {4},
  pages        = {359--370},
  year         = {2010},
  url          = {https://doi.org/10.1080/01611194.2010.485452},
  doi          = {10.1080/01611194.2010.485452},
  timestamp    = {Thu, 03 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Burke10a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Bury10,
  author       = {Jan Bury},
  title        = {Operation Lotos: An Unsuccessful Attempt on {U.S.} Government Communications},
  journal      = {Cryptologia},
  volume       = {34},
  number       = {1},
  pages        = {60--87},
  year         = {2010},
  url          = {https://doi.org/10.1080/01611190903388039},
  doi          = {10.1080/01611190903388039},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Bury10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Christensen10,
  author       = {Chris Christensen},
  title        = {Alan Turing's First Cryptology Textbook and Sinkov's Revision of it},
  journal      = {Cryptologia},
  volume       = {34},
  number       = {1},
  pages        = {27--43},
  year         = {2010},
  url          = {https://doi.org/10.1080/01611190902908175},
  doi          = {10.1080/01611190902908175},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Christensen10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Christensen10a,
  author       = {Chris Christensen},
  title        = {Review of \emph{Bletchley Park: An Inmate's Story} by James Thirsk},
  journal      = {Cryptologia},
  volume       = {34},
  number       = {1},
  pages        = {88--89},
  year         = {2010},
  url          = {https://doi.org/10.1080/01611190903385068},
  doi          = {10.1080/01611190903385068},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Christensen10a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Christensen10b,
  author       = {Chris Christensen},
  title        = {Review of the 2009 Cryptologic History Symposium: \emph{Global Perspectives
                  on Cryptologic History}},
  journal      = {Cryptologia},
  volume       = {34},
  number       = {2},
  pages        = {176--179},
  year         = {2010},
  url          = {https://doi.org/10.1080/01611191003598113},
  doi          = {10.1080/01611191003598113},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Christensen10b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Christensen10c,
  author       = {Chris Christensen},
  title        = {Review of \emph{Elementary Cryptanalysis: {A} Mathematical Approach,
                  Second Edition} by Abraham Sinkov, revised and updated by Todd Feil},
  journal      = {Cryptologia},
  volume       = {34},
  number       = {3},
  pages        = {269--272},
  year         = {2010},
  url          = {https://doi.org/10.1080/01611191003600794},
  doi          = {10.1080/01611191003600794},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Christensen10c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Christensen10d,
  author       = {Chris Christensen},
  title        = {Review of \emph{The Real Enigma Heroes} by Phil Shanahan},
  journal      = {Cryptologia},
  volume       = {34},
  number       = {3},
  pages        = {273--277},
  year         = {2010},
  url          = {https://doi.org/10.1080/01611191003600695},
  doi          = {10.1080/01611191003600695},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Christensen10d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Christensen10e,
  author       = {Chris Christensen},
  title        = {Review of Two "Gift Books" about Cryptology},
  journal      = {Cryptologia},
  volume       = {34},
  number       = {3},
  pages        = {278--279},
  year         = {2010},
  url          = {https://doi.org/10.1080/01611191003598063},
  doi          = {10.1080/01611191003598063},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Christensen10e.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Dooley10,
  author       = {John F. Dooley},
  title        = {Reviews of Cryptologic Fiction},
  journal      = {Cryptologia},
  volume       = {34},
  number       = {1},
  pages        = {96--100},
  year         = {2010},
  url          = {https://doi.org/10.1080/01611190903384053},
  doi          = {10.1080/01611190903384053},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Dooley10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Dooley10a,
  author       = {John F. Dooley},
  title        = {Reviews of Cryptologic Fiction},
  journal      = {Cryptologia},
  volume       = {34},
  number       = {2},
  pages        = {180--185},
  year         = {2010},
  url          = {https://doi.org/10.1080/01611191003600778},
  doi          = {10.1080/01611191003600778},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Dooley10a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Erskine10,
  author       = {Ralph Erskine},
  title        = {Ultra Reveals a Late \emph{B-Dienst} Success in the Atlantic},
  journal      = {Cryptologia},
  volume       = {34},
  number       = {4},
  pages        = {340--358},
  year         = {2010},
  url          = {https://doi.org/10.1080/01611194.2010.485412},
  doi          = {10.1080/01611194.2010.485412},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Erskine10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Faurholt10,
  author       = {Niels Faurholt},
  title        = {E.S.Schieber German Code Device from {WWII}},
  journal      = {Cryptologia},
  volume       = {34},
  number       = {1},
  pages        = {44--51},
  year         = {2010},
  url          = {https://doi.org/10.1080/01611190903225942},
  doi          = {10.1080/01611190903225942},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Faurholt10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/FuensantaEW10,
  author       = {Jos{\'{e}} Ram{\'{o}}n Soler Fuensanta and
                  Francisco Javier L{\'{o}}pez{-}Brea Espiau and
                  Frode Weierud},
  title        = {Spanish Enigma: {A} History of the Enigma in Spain},
  journal      = {Cryptologia},
  volume       = {34},
  number       = {4},
  pages        = {301--328},
  year         = {2010},
  url          = {https://doi.org/10.1080/01611194.2010.485414},
  doi          = {10.1080/01611194.2010.485414},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/FuensantaEW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/HolblWB10,
  author       = {Marko H{\"{o}}lbl and
                  Tatjana Welzer and
                  Bostjan Brumen},
  title        = {Attacks and Improvement of an Efficient Remote Mutual Authentication
                  and Key Agreement Scheme},
  journal      = {Cryptologia},
  volume       = {34},
  number       = {1},
  pages        = {52--59},
  year         = {2010},
  url          = {https://doi.org/10.1080/01611190903030912},
  doi          = {10.1080/01611190903030912},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/HolblWB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/JainH10,
  author       = {Ashwin Jain and
                  C. Hari},
  title        = {A New Efficient Protocol for k-out-of-n Oblivious Transfer},
  journal      = {Cryptologia},
  volume       = {34},
  number       = {4},
  pages        = {282--290},
  year         = {2010},
  url          = {https://doi.org/10.1080/01611194.2010.509284},
  doi          = {10.1080/01611194.2010.509284},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/JainH10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kahn10,
  author       = {David Kahn},
  title        = {How {I} Discovered World War II's Greatest Spy},
  journal      = {Cryptologia},
  volume       = {34},
  number       = {1},
  pages        = {12--21},
  year         = {2010},
  url          = {https://doi.org/10.1080/01611190903385019},
  doi          = {10.1080/01611190903385019},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kahn10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kahn10a,
  author       = {David Kahn},
  title        = {Louis Kruh, Cryptologist, Editor, Activist},
  journal      = {Cryptologia},
  volume       = {34},
  number       = {3},
  pages        = {197--199},
  year         = {2010},
  url          = {https://doi.org/10.1080/01611194.2010.496278},
  doi          = {10.1080/01611194.2010.496278},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kahn10a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Koblitz10,
  author       = {Neal Koblitz},
  title        = {Secret Codes and Online Security: {A} Seminar for Entering Students},
  journal      = {Cryptologia},
  volume       = {34},
  number       = {2},
  pages        = {145--154},
  year         = {2010},
  url          = {https://doi.org/10.1080/01611191003590821},
  doi          = {10.1080/01611191003590821},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Koblitz10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/KonikoffT10,
  author       = {Jacob Konikoff and
                  Seth Toplosky},
  title        = {Analysis of Simplified {DES} Algorithms},
  journal      = {Cryptologia},
  volume       = {34},
  number       = {3},
  pages        = {211--224},
  year         = {2010},
  url          = {https://doi.org/10.1080/01611191003646433},
  doi          = {10.1080/01611191003646433},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/KonikoffT10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kurt10,
  author       = {Yesem Kurt},
  title        = {Deciphering an Undergraduate Cryptology Course},
  journal      = {Cryptologia},
  volume       = {34},
  number       = {2},
  pages        = {155--162},
  year         = {2010},
  url          = {https://doi.org/10.1080/01611190903225421},
  doi          = {10.1080/01611190903225421},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kurt10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Lang10,
  author       = {Benedek L{\'{a}}ng},
  title        = {Why Don't We Decipher an Outdated Cipher System? The Codex of Rohonc},
  journal      = {Cryptologia},
  volume       = {34},
  number       = {2},
  pages        = {115--144},
  year         = {2010},
  url          = {https://doi.org/10.1080/01611191003605587},
  doi          = {10.1080/01611191003605587},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Lang10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Levine10,
  author       = {Emil H. Levine},
  title        = {Review of \emph{Deciphering the Rising Sun: Navy and Marine Corps
                  Codebreakers, Translators, and Interpreters in the Pacific War} by
                  Roger Dingman},
  journal      = {Cryptologia},
  volume       = {34},
  number       = {2},
  pages        = {194--196},
  year         = {2010},
  url          = {https://doi.org/10.1080/01611191003600596},
  doi          = {10.1080/01611191003600596},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Levine10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/ParakhK10,
  author       = {Abhishek Parakh and
                  Subhash C. Kak},
  title        = {Internet Voting Protocol Based on Improved Implicit Security},
  journal      = {Cryptologia},
  volume       = {34},
  number       = {3},
  pages        = {258--268},
  year         = {2010},
  url          = {https://doi.org/10.1080/01611194.2010.485421},
  doi          = {10.1080/01611194.2010.485421},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/ParakhK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/PatarinN10,
  author       = {Jacques Patarin and
                  Val{\'{e}}rie Nachef},
  title        = {"I Shall Love You Until Death" (Marie-Antoinette to Axel von Fersen)},
  journal      = {Cryptologia},
  volume       = {34},
  number       = {2},
  pages        = {104--114},
  year         = {2010},
  url          = {https://doi.org/10.1080/01611191003621212},
  doi          = {10.1080/01611191003621212},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/PatarinN10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/PopoveniucV10,
  author       = {Stefan Popoveniuc and
                  Poorvi L. Vora},
  title        = {Secure Electronic Voting - {A} Framework},
  journal      = {Cryptologia},
  volume       = {34},
  number       = {3},
  pages        = {236--257},
  year         = {2010},
  url          = {https://doi.org/10.1080/01611190902894961},
  doi          = {10.1080/01611190902894961},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/PopoveniucV10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Rijmenants10,
  author       = {Dirk Rijmenants},
  title        = {Enigma Message Procedures Used by the Heer, Luftwaffe and Kriegsmarine},
  journal      = {Cryptologia},
  volume       = {34},
  number       = {4},
  pages        = {329--339},
  year         = {2010},
  url          = {https://doi.org/10.1080/01611194.2010.486257},
  doi          = {10.1080/01611194.2010.486257},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Rijmenants10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Schmeh10,
  author       = {Klaus Schmeh},
  title        = {Alexander von Kryha and His Encryption Machines},
  journal      = {Cryptologia},
  volume       = {34},
  number       = {4},
  pages        = {291--300},
  year         = {2010},
  url          = {https://doi.org/10.1080/01611194.2010.485440},
  doi          = {10.1080/01611194.2010.485440},
  timestamp    = {Mon, 29 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Schmeh10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Stallings10,
  author       = {William Stallings},
  title        = {{NIST} Block Cipher Modes of Operation for Confidentiality},
  journal      = {Cryptologia},
  volume       = {34},
  number       = {2},
  pages        = {163--175},
  year         = {2010},
  url          = {https://doi.org/10.1080/01611190903185401},
  doi          = {10.1080/01611190903185401},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Stallings10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Stallings10a,
  author       = {William Stallings},
  title        = {{NIST} Block Cipher Modes of Operation for Authentication and Combined
                  Confidentiality and Authentication},
  journal      = {Cryptologia},
  volume       = {34},
  number       = {3},
  pages        = {225--235},
  year         = {2010},
  url          = {https://doi.org/10.1080/01611191003598295},
  doi          = {10.1080/01611191003598295},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Stallings10a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Strasser10,
  author       = {Gerhard F. Strasser},
  title        = {Ninth-Century Figural Poetry and Medieval Easter Tables - Possible
                  Inspirations for the Square Tables of Trithemius and Vigen{\`{e}}re?},
  journal      = {Cryptologia},
  volume       = {34},
  number       = {1},
  pages        = {22--26},
  year         = {2010},
  url          = {https://doi.org/10.1080/01611190903384970},
  doi          = {10.1080/01611190903384970},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Strasser10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Strasser10a,
  author       = {Gerhard F. Strasser},
  title        = {Review of \emph{Versteckte Botschaften. Die faszinierende Geschichte
                  der Steganografie} (Hidden Messages. The Fascinating Story of Steganography)},
  journal      = {Cryptologia},
  volume       = {34},
  number       = {4},
  pages        = {371--380},
  year         = {2010},
  url          = {https://doi.org/10.1080/01611194.2010.509160},
  doi          = {10.1080/01611194.2010.509160},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Strasser10a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Winkel10,
  author       = {Brian J. Winkel},
  title        = {David, Calm Down! On Second and More Reflective Thought, Don't!},
  journal      = {Cryptologia},
  volume       = {34},
  number       = {2},
  pages        = {101--103},
  year         = {2010},
  url          = {https://doi.org/10.1080/01611191003590763},
  doi          = {10.1080/01611191003590763},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Winkel10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/AngelM09,
  author       = {Jos{\'{e}} de Jes{\'{u}}s Angel Angel and
                  Guillermo Morales{-}Luna},
  title        = {Cryptographic Methods During the Mexican Revolution},
  journal      = {Cryptologia},
  volume       = {33},
  number       = {2},
  pages        = {188--196},
  year         = {2009},
  url          = {https://doi.org/10.1080/01611190902744059},
  doi          = {10.1080/01611190902744059},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/AngelM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Aumasson09,
  author       = {Jean{-}Philippe Aumasson},
  title        = {Cryptanalysis of a Hash Function Based on Norm Form Equations},
  journal      = {Cryptologia},
  volume       = {33},
  number       = {1},
  pages        = {12--15},
  year         = {2009},
  url          = {https://doi.org/10.1080/01611190802306793},
  doi          = {10.1080/01611190802306793},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Aumasson09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Bauer09,
  author       = {Craig P. Bauer},
  title        = {Dedication to Dr. Jay Anderson},
  journal      = {Cryptologia},
  volume       = {33},
  number       = {2},
  pages        = {107},
  year         = {2009},
  url          = {https://doi.org/10.1080/01611190802565976},
  doi          = {10.1080/01611190802565976},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Bauer09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Beaver09,
  author       = {Cheryl L. Beaver},
  title        = {Cryptology in the Classroom: Analyzing a Zero-Knowledge Protocol},
  journal      = {Cryptologia},
  volume       = {33},
  number       = {1},
  pages        = {16--23},
  year         = {2009},
  url          = {https://doi.org/10.1080/01611190802550911},
  doi          = {10.1080/01611190802550911},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Beaver09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Boliver09,
  author       = {David E. Boliver},
  title        = {Cryptology as College Outreach to Young Teens},
  journal      = {Cryptologia},
  volume       = {33},
  number       = {2},
  pages        = {158--165},
  year         = {2009},
  url          = {https://doi.org/10.1080/01611190802253359},
  doi          = {10.1080/01611190802253359},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Boliver09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Brandt09,
  author       = {Howard E. Brandt},
  title        = {Review of \emph{Protecting Information: From Classical Error Correction
                  to Quantum Cryptography} by Susan Loepp and William K. Wootters},
  journal      = {Cryptologia},
  volume       = {33},
  number       = {2},
  pages        = {205--207},
  year         = {2009},
  url          = {https://doi.org/10.1080/01611190902740453},
  doi          = {10.1080/01611190902740453},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Brandt09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Budiansky09,
  author       = {Stephen Budiansky},
  title        = {Review of \emph{Decoding the IRA} by Tom Mahon and James J. Gillogly},
  journal      = {Cryptologia},
  volume       = {33},
  number       = {3},
  pages        = {292--294},
  year         = {2009},
  url          = {https://doi.org/10.1080/01611190902967023},
  doi          = {10.1080/01611190902967023},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Budiansky09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Burke09,
  author       = {Colin B. Burke},
  title        = {Review of \emph{Echoes of our Past} by the Naval Cryptologic Veterans
                  Association},
  journal      = {Cryptologia},
  volume       = {33},
  number       = {1},
  pages        = {98},
  year         = {2009},
  url          = {https://doi.org/10.1080/01611190802551786},
  doi          = {10.1080/01611190802551786},
  timestamp    = {Thu, 03 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Burke09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Burke09a,
  author       = {Colin B. Burke},
  title        = {Review of \emph{American Cryptology during the Cold War, 1945-1989}
                  by Thomas R. Johnson},
  journal      = {Cryptologia},
  volume       = {33},
  number       = {2},
  pages        = {197--200},
  year         = {2009},
  url          = {https://doi.org/10.1080/01611190902740461},
  doi          = {10.1080/01611190902740461},
  timestamp    = {Thu, 03 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Burke09a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Bury09,
  author       = {Jan Bury},
  title        = {Breaking Unbreakable Ciphers. The Asen Georgiyev Spy Case},
  journal      = {Cryptologia},
  volume       = {33},
  number       = {1},
  pages        = {74--88},
  year         = {2009},
  url          = {https://doi.org/10.1080/01611190802319093},
  doi          = {10.1080/01611190802319093},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Bury09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Bury09a,
  author       = {Jan Bury},
  title        = {From the Archives: {CX-52} Messages Read by Red Poles?},
  journal      = {Cryptologia},
  volume       = {33},
  number       = {4},
  pages        = {347--352},
  year         = {2009},
  url          = {https://doi.org/10.1080/01611190902742467},
  doi          = {10.1080/01611190902742467},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Bury09a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/ChaumHPV09,
  author       = {David Chaum and
                  Benjamin Hosp and
                  Stefan Popoveniuc and
                  Poorvi L. Vora},
  title        = {Accessible Voter-Verifiability},
  journal      = {Cryptologia},
  volume       = {33},
  number       = {3},
  pages        = {283--291},
  year         = {2009},
  url          = {https://doi.org/10.1080/01611190902894946},
  doi          = {10.1080/01611190902894946},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/ChaumHPV09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Christensen09,
  author       = {Chris Christensen},
  title        = {Review of \emph{Modern Cryptanalysis: Techniques for Advanced Code
                  Breaking} by Christopher Swenson},
  journal      = {Cryptologia},
  volume       = {33},
  number       = {1},
  pages        = {89--94},
  year         = {2009},
  url          = {https://doi.org/10.1080/01611190802293397},
  doi          = {10.1080/01611190802293397},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Christensen09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Christensen09a,
  author       = {Chris Christensen},
  title        = {Review of \emph{An Introduction to Mathematical Cryptography} by Hoffstein,
                  Pipher, and Silverman},
  journal      = {Cryptologia},
  volume       = {33},
  number       = {2},
  pages        = {201--204},
  year         = {2009},
  url          = {https://doi.org/10.1080/01611190902721016},
  doi          = {10.1080/01611190902721016},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Christensen09a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Christensen09b,
  author       = {Chris Christensen},
  title        = {Reviews of Two \emph{Post-Quantum Cryptography} Books},
  journal      = {Cryptologia},
  volume       = {33},
  number       = {3},
  pages        = {271--273},
  year         = {2009},
  url          = {https://doi.org/10.1080/01611190902742749},
  doi          = {10.1080/01611190902742749},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Christensen09b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Christensen09c,
  author       = {Chris Christensen},
  title        = {Review of \emph{The Shadow Factory: The Ultra-Secret {NSA} from 9/11
                  to the Eavesdropping on America} by James Bamford},
  journal      = {Cryptologia},
  volume       = {33},
  number       = {4},
  pages        = {356--358},
  year         = {2009},
  url          = {https://doi.org/10.1080/01611190903115150},
  doi          = {10.1080/01611190903115150},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Christensen09c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Christensen09d,
  author       = {Chris Christensen},
  title        = {Review of \emph{Random Curves} by Neal Koblitz},
  journal      = {Cryptologia},
  volume       = {33},
  number       = {4},
  pages        = {359--365},
  year         = {2009},
  url          = {https://doi.org/10.1080/01611190903115119},
  doi          = {10.1080/01611190903115119},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Christensen09d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Christensen09e,
  author       = {Chris Christensen},
  title        = {Review of \emph{Ultra Versus U-Boats: Enigma Decrypts in The National
                  Archives} by Roy Conyers Nesbit},
  journal      = {Cryptologia},
  volume       = {33},
  number       = {4},
  pages        = {366--369},
  year         = {2009},
  url          = {https://doi.org/10.1080/01611190903185179},
  doi          = {10.1080/01611190903185179},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Christensen09e.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/David09,
  author       = {James David},
  title        = {Review of The {U.S.} Intelligence Community (Fifth Edition) by Jeffrey
                  T. Richelson},
  journal      = {Cryptologia},
  volume       = {33},
  number       = {1},
  pages        = {99--101},
  year         = {2009},
  url          = {https://doi.org/10.1080/01611190802160588},
  doi          = {10.1080/01611190802160588},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/David09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Dooley09,
  author       = {John F. Dooley},
  title        = {Reviews of Cryptologic Fiction},
  journal      = {Cryptologia},
  volume       = {33},
  number       = {2},
  pages        = {212--215},
  year         = {2009},
  url          = {https://doi.org/10.1080/01611190902740529},
  doi          = {10.1080/01611190902740529},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Dooley09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Dooley09a,
  author       = {John F. Dooley},
  title        = {Another Yardley Mystery},
  journal      = {Cryptologia},
  volume       = {33},
  number       = {3},
  pages        = {276--282},
  year         = {2009},
  url          = {https://doi.org/10.1080/01611190902894938},
  doi          = {10.1080/01611190902894938},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Dooley09a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/DooleyR09,
  author       = {John F. Dooley and
                  Yvonne I. Ramirez},
  title        = {Who Wrote \emph{The Blonde Countess}? {A} Stylometric Analysis of
                  Herbert O. Yardley's Fiction},
  journal      = {Cryptologia},
  volume       = {33},
  number       = {2},
  pages        = {108--117},
  year         = {2009},
  url          = {https://doi.org/10.1080/01611190802653244},
  doi          = {10.1080/01611190802653244},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/DooleyR09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Fuensanta09,
  author       = {Jos{\'{e}} Ram{\'{o}}n Soler Fuensanta},
  title        = {\emph{Treaty of Cryptography} by Joaqu{\'{\i}}n Garc{\'{\i}}a
                  Carmona?},
  journal      = {Cryptologia},
  volume       = {33},
  number       = {2},
  pages        = {118--124},
  year         = {2009},
  url          = {https://doi.org/10.1080/01611190902742681},
  doi          = {10.1080/01611190902742681},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Fuensanta09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/GalleryM09,
  author       = {Eimear Gallery and
                  Chris J. Mitchell},
  title        = {Trusted Computing: Security and Applications},
  journal      = {Cryptologia},
  volume       = {33},
  number       = {3},
  pages        = {217--245},
  year         = {2009},
  url          = {https://doi.org/10.1080/01611190802231140},
  doi          = {10.1080/01611190802231140},
  timestamp    = {Mon, 05 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/GalleryM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/GuG09,
  author       = {Haihua Gu and
                  Dawu Gu},
  title        = {Speeding Up the Double-Base Recoding Algorithm of Scalar Multiplication},
  journal      = {Cryptologia},
  volume       = {33},
  number       = {4},
  pages        = {315--320},
  year         = {2009},
  url          = {https://doi.org/10.1080/01611190903185344},
  doi          = {10.1080/01611190903185344},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/GuG09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Hamer09,
  author       = {David Hamer},
  title        = {Review of \emph{Herivelismus and the German Military Enigma} by John
                  Herivel},
  journal      = {Cryptologia},
  volume       = {33},
  number       = {1},
  pages        = {95--97},
  year         = {2009},
  url          = {https://doi.org/10.1080/01611190802549012},
  doi          = {10.1080/01611190802549012},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Hamer09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Hamer09a,
  author       = {David Hamer},
  title        = {Review of \emph{From Bletchley with Love} by Mavis Batey},
  journal      = {Cryptologia},
  volume       = {33},
  number       = {3},
  pages        = {274--275},
  year         = {2009},
  url          = {https://doi.org/10.1080/01611190902788825},
  doi          = {10.1080/01611190902788825},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Hamer09a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Joyner09,
  author       = {David Joyner},
  title        = {Review of \emph{Algorithmic Number Theory: Lattices, Curves and Cryptography},
                  Edited by J. P. Buhler and P. Stevenhagen},
  journal      = {Cryptologia},
  volume       = {33},
  number       = {2},
  pages        = {208--211},
  year         = {2009},
  url          = {https://doi.org/10.1080/01611190902740602},
  doi          = {10.1080/01611190902740602},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Joyner09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/KimP09,
  author       = {Jongsung Kim and
                  Raphael C.{-}W. Phan},
  title        = {Advanced Differential-Style Cryptanalysis of the NSA's Skipjack Block
                  Cipher},
  journal      = {Cryptologia},
  volume       = {33},
  number       = {3},
  pages        = {246--270},
  year         = {2009},
  url          = {https://doi.org/10.1080/01611190802653228},
  doi          = {10.1080/01611190802653228},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/KimP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kruh09,
  author       = {David Kruh},
  title        = {Review of Spies of the Bible: Espionage in Israel from the Exodus
                  to the Bar Kokhba Revolt by Rose Mary Sheldon},
  journal      = {Cryptologia},
  volume       = {33},
  number       = {1},
  pages        = {104--105},
  year         = {2009},
  url          = {https://doi.org/10.1080/01611190802548899},
  doi          = {10.1080/01611190802548899},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kruh09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kruth09,
  author       = {Louis Kruh},
  title        = {A Belated Tribute to Rosario Candela},
  journal      = {Cryptologia},
  volume       = {33},
  number       = {1},
  pages        = {1--11},
  year         = {2009},
  url          = {https://doi.org/10.1080/01611190802293314},
  doi          = {10.1080/01611190802293314},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kruth09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Link09,
  author       = {David Link},
  title        = {Resurrecting \emph{Bomba Kryptologiczna}: Archaeology of Algorithmic
                  Artefacts, {I}},
  journal      = {Cryptologia},
  volume       = {33},
  number       = {2},
  pages        = {166--182},
  year         = {2009},
  url          = {https://doi.org/10.1080/01611190802562809},
  doi          = {10.1080/01611190802562809},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Link09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/LiuZ09,
  author       = {Jiqiang Liu and
                  Sheng Zhong},
  title        = {Analysis of Kim-Jeon-Yoo Password Authentication Schemes},
  journal      = {Cryptologia},
  volume       = {33},
  number       = {2},
  pages        = {183--187},
  year         = {2009},
  url          = {https://doi.org/10.1080/01611190802653236},
  doi          = {10.1080/01611190802653236},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/LiuZ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/May09,
  author       = {Mike May},
  title        = {Using Maple Worksheets to Enable Student Explorations of Cryptography},
  journal      = {Cryptologia},
  volume       = {33},
  number       = {2},
  pages        = {151--157},
  year         = {2009},
  url          = {https://doi.org/10.1080/01611190802323798},
  doi          = {10.1080/01611190802323798},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/May09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/McDevittL09,
  author       = {Tim McDevitt and
                  Tom Leap},
  title        = {Multimedia Cryptology},
  journal      = {Cryptologia},
  volume       = {33},
  number       = {2},
  pages        = {142--150},
  year         = {2009},
  url          = {https://doi.org/10.1080/01611190802300408},
  doi          = {10.1080/01611190802300408},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/McDevittL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Melka09,
  author       = {Tomi S. Melka},
  title        = {Some Considerations about the \emph{Kohau Rongorongo} Script in the
                  Light of a Statistical Analysis of the 'Santiago Staff'},
  journal      = {Cryptologia},
  volume       = {33},
  number       = {1},
  pages        = {24--73},
  year         = {2009},
  url          = {https://doi.org/10.1080/01611190802548998},
  doi          = {10.1080/01611190802548998},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Melka09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Phan09,
  author       = {Raphael C.{-}W. Phan},
  title        = {Review of Security Engineering: {A} Guide to Building Dependable Distributed
                  Systems, 2nd Edition by Ross J. Anderson},
  journal      = {Cryptologia},
  volume       = {33},
  number       = {1},
  pages        = {102--103},
  year         = {2009},
  url          = {https://doi.org/10.1080/01611190802550804},
  doi          = {10.1080/01611190802550804},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Phan09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/RaviK09,
  author       = {Sujith Ravi and
                  Kevin Knight},
  title        = {Attacking Letter Substitution Ciphers with Integer Programming},
  journal      = {Cryptologia},
  volume       = {33},
  number       = {4},
  pages        = {321--334},
  year         = {2009},
  url          = {https://doi.org/10.1080/01611190903030920},
  doi          = {10.1080/01611190903030920},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/RaviK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/RiceY09,
  author       = {Blake Rice and
                  Bill Yankosky},
  title        = {Elliptic Curve Cryptography with the {TI-83}},
  journal      = {Cryptologia},
  volume       = {33},
  number       = {2},
  pages        = {125--141},
  year         = {2009},
  url          = {https://doi.org/10.1080/01611190802214914},
  doi          = {10.1080/01611190802214914},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/RiceY09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Schmeh09,
  author       = {Klaus Schmeh},
  title        = {Enigma's Contemporary Witness: Gisbert Hasenjaeger},
  journal      = {Cryptologia},
  volume       = {33},
  number       = {4},
  pages        = {343--346},
  year         = {2009},
  url          = {https://doi.org/10.1080/01611190903186003},
  doi          = {10.1080/01611190903186003},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Schmeh09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Schwartz09,
  author       = {Kathryn A. Schwartz},
  title        = {Charting Arabic Cryptology's Evolution},
  journal      = {Cryptologia},
  volume       = {33},
  number       = {4},
  pages        = {297--304},
  year         = {2009},
  url          = {https://doi.org/10.1080/01611190903030904},
  doi          = {10.1080/01611190903030904},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Schwartz09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Simmons09,
  author       = {Sean Simmons},
  title        = {Algebraic Cryptanalysis of Simplified {AES}},
  journal      = {Cryptologia},
  volume       = {33},
  number       = {4},
  pages        = {305--314},
  year         = {2009},
  url          = {https://doi.org/10.1080/01611190903185328},
  doi          = {10.1080/01611190903185328},
  timestamp    = {Thu, 01 Mar 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Simmons09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Wolfe09,
  author       = {Henry B. Wolfe},
  title        = {Review of \emph{Eavesdropping on Hell: Historical Guide to Western
                  Communications Intelligence and Holocaust, 1939-1945} by Robert J.
                  Hanyok},
  journal      = {Cryptologia},
  volume       = {33},
  number       = {4},
  pages        = {353--355},
  year         = {2009},
  url          = {https://doi.org/10.1080/01611190903115192},
  doi          = {10.1080/01611190903115192},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Wolfe09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/YumL09,
  author       = {Dae Hyun Yum and
                  Pil Joong Lee},
  title        = {Cracking Hill Ciphers with Goodness-of-Fit Statistics},
  journal      = {Cryptologia},
  volume       = {33},
  number       = {4},
  pages        = {335--342},
  year         = {2009},
  url          = {https://doi.org/10.1080/01611190903185369},
  doi          = {10.1080/01611190903185369},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/YumL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/AdlerFLY08,
  author       = {Jeffrey D. Adler and
                  Ryan W. Fuoss and
                  Michael J. Levin and
                  Amanda R. Youell},
  title        = {Reading Encrypted Diplomatic Correspondence: An Undergraduate Research
                  Project},
  journal      = {Cryptologia},
  volume       = {32},
  number       = {1},
  pages        = {1--12},
  year         = {2008},
  url          = {https://doi.org/10.1080/01611190701498212},
  doi          = {10.1080/01611190701498212},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/AdlerFLY08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Albrecht08,
  author       = {Martin R. Albrecht},
  title        = {Algebraic Attacks on the Courtois Toy Cipher},
  journal      = {Cryptologia},
  volume       = {32},
  number       = {3},
  pages        = {220--276},
  year         = {2008},
  url          = {https://doi.org/10.1080/01611190802058139},
  doi          = {10.1080/01611190802058139},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Albrecht08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Batey08,
  author       = {Mavis Batey},
  title        = {Dilly Knox - {A} Reminiscence of this Pioneer Enigma Cryptanalyst},
  journal      = {Cryptologia},
  volume       = {32},
  number       = {2},
  pages        = {104--130},
  year         = {2008},
  url          = {https://doi.org/10.1080/01611190801914290},
  doi          = {10.1080/01611190801914290},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Batey08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Boklan08,
  author       = {Kent D. Boklan},
  title        = {How {I} Broke an Encrypted Diary from the War of 1812},
  journal      = {Cryptologia},
  volume       = {32},
  number       = {4},
  pages        = {299--310},
  year         = {2008},
  url          = {https://doi.org/10.1080/01611190802232155},
  doi          = {10.1080/01611190802232155},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Boklan08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Buonafalce08,
  author       = {Augusto Buonafalce},
  title        = {Cicco Simonetta's Cipher-Breaking Rules},
  journal      = {Cryptologia},
  volume       = {32},
  number       = {1},
  pages        = {62--70},
  year         = {2008},
  url          = {https://doi.org/10.1080/01611190701756585},
  doi          = {10.1080/01611190701756585},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Buonafalce08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Burke08,
  author       = {Colin B. Burke},
  title        = {From the Archives: The Last Bombe Run, 1955},
  journal      = {Cryptologia},
  volume       = {32},
  number       = {3},
  pages        = {277--278},
  year         = {2008},
  url          = {https://doi.org/10.1080/01611190802113777},
  doi          = {10.1080/01611190802113777},
  timestamp    = {Thu, 03 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Burke08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Bury08,
  author       = {Jan Bury},
  title        = {From the Archives: Intercepting Best Friend?},
  journal      = {Cryptologia},
  volume       = {32},
  number       = {1},
  pages        = {84--87},
  year         = {2008},
  url          = {https://doi.org/10.1080/01611190701743609},
  doi          = {10.1080/01611190701743609},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Bury08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Bury08a,
  author       = {Jan Bury},
  title        = {From the Archives: Inside a Cold War Crypto Cell. Polish Cipher Bureau
                  in the 1980s},
  journal      = {Cryptologia},
  volume       = {32},
  number       = {4},
  pages        = {351--367},
  year         = {2008},
  url          = {https://doi.org/10.1080/01611190802319036},
  doi          = {10.1080/01611190802319036},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Bury08a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Chan08,
  author       = {Wayne S. Chan},
  title        = {Key Enclosed: Examining the Evidence for the Missing Key Letter of
                  the Beale Cipher},
  journal      = {Cryptologia},
  volume       = {32},
  number       = {1},
  pages        = {33--36},
  year         = {2008},
  url          = {https://doi.org/10.1080/01611190701577759},
  doi          = {10.1080/01611190701577759},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Chan08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Christensen08,
  author       = {Chris Christensen},
  title        = {Review of The Collective Works of Captain George P. McGinnis by George
                  P. McGinnis},
  journal      = {Cryptologia},
  volume       = {32},
  number       = {1},
  pages        = {88--89},
  year         = {2008},
  url          = {https://doi.org/10.1080/01611190701743625},
  doi          = {10.1080/01611190701743625},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Christensen08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Christensen08a,
  author       = {Chris Christensen},
  title        = {Review of How to Tell a Secret: Tips, Tricks {\&} Techniques for
                  Breaking Codes {\&} Conveying Covert Information by P. J. Huff
                  and J. G. Lewin},
  journal      = {Cryptologia},
  volume       = {32},
  number       = {1},
  pages        = {90--91},
  year         = {2008},
  url          = {https://doi.org/10.1080/01611190701582460},
  doi          = {10.1080/01611190701582460},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Christensen08a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Christensen08b,
  author       = {Chris Christensen},
  title        = {Review of Voices of the Code Breakers: Personal Accounts of the Secret
                  Heroes of World War Ii by Michael Paterson},
  journal      = {Cryptologia},
  volume       = {32},
  number       = {2},
  pages        = {186--188},
  year         = {2008},
  url          = {https://doi.org/10.1080/01611190701856641},
  doi          = {10.1080/01611190701856641},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Christensen08b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Christensen08c,
  author       = {Chris Christensen},
  title        = {Review of A\({}^{\mbox{3}}\) and His Algebra by Nancy E. Albert},
  journal      = {Cryptologia},
  volume       = {32},
  number       = {2},
  pages        = {189--196},
  year         = {2008},
  url          = {https://doi.org/10.1080/01611190701869461},
  doi          = {10.1080/01611190701869461},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Christensen08c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Christensen08d,
  author       = {Chris Christensen},
  title        = {Review of \emph{The History of Information Security: {A} Comprehensive
                  Handbook} edited by Karl de Leeuw and Jan Bergstra},
  journal      = {Cryptologia},
  volume       = {32},
  number       = {3},
  pages        = {284--294},
  year         = {2008},
  url          = {https://doi.org/10.1080/01611190802125854},
  doi          = {10.1080/01611190802125854},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Christensen08d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/ChristensenG08,
  author       = {Chris Christensen and
                  Suzanne E. Gladfelter},
  title        = {Taking a Cryptology Class to Bletchley Park},
  journal      = {Cryptologia},
  volume       = {32},
  number       = {1},
  pages        = {23--32},
  year         = {2008},
  url          = {https://doi.org/10.1080/01611190701548271},
  doi          = {10.1080/01611190701548271},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/ChristensenG08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Cowan08,
  author       = {Michael J. Cowan},
  title        = {Breaking Short Playfair Ciphers with the Simulated Annealing Algorithm},
  journal      = {Cryptologia},
  volume       = {32},
  number       = {1},
  pages        = {71--83},
  year         = {2008},
  url          = {https://doi.org/10.1080/01611190701743658},
  doi          = {10.1080/01611190701743658},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Cowan08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Diffie08,
  author       = {Whitfield Diffie},
  title        = {What Did We Do Before Biometric Passports? {A} Review of \emph{Who
                  Are You? Identification, Deception, and Surveillance in Early Modern
                  Europe} by Valentin Groebner},
  journal      = {Cryptologia},
  volume       = {32},
  number       = {4},
  pages        = {368--369},
  year         = {2008},
  url          = {https://doi.org/10.1080/01611190802215077},
  doi          = {10.1080/01611190802215077},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Diffie08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Dooley08,
  author       = {John F. Dooley},
  title        = {Reviews of Cryptologic Fiction},
  journal      = {Cryptologia},
  volume       = {32},
  number       = {3},
  pages        = {295--298},
  year         = {2008},
  url          = {https://doi.org/10.1080/01611190802114445},
  doi          = {10.1080/01611190802114445},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Dooley08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Erskine08,
  author       = {Ralph Erskine},
  title        = {Captured \emph{Kriegsmarine} Enigma Documents at Bletchley Park},
  journal      = {Cryptologia},
  volume       = {32},
  number       = {3},
  pages        = {199--219},
  year         = {2008},
  url          = {https://doi.org/10.1080/01611190802088318},
  doi          = {10.1080/01611190802088318},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Erskine08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/EsqX08,
  author       = {Louis Kruh},
  title        = {Review of Figuring It Out At Bletchley Park 1939-1945 by John Gallehawk
                  and Kerry Johnson},
  journal      = {Cryptologia},
  volume       = {32},
  number       = {2},
  pages        = {184--185},
  year         = {2008},
  url          = {https://doi.org/10.1080/01611190801917087},
  doi          = {10.1080/01611190801917087},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/EsqX08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Gallehawk08,
  author       = {John C. Gallehawk},
  title        = {Review of Delusions of Intelligence by R. A. Ratcliff},
  journal      = {Cryptologia},
  volume       = {32},
  number       = {1},
  pages        = {98--100},
  year         = {2008},
  url          = {https://doi.org/10.1080/01611190701758045},
  doi          = {10.1080/01611190701758045},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Gallehawk08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Grajek08,
  author       = {Marek Grajek},
  title        = {Monument \emph{in Memoriam} of Marian Rejewski, Jerzy R{\'{o}}zycki
                  and Henryk Zygalski Unveiled in Poznan},
  journal      = {Cryptologia},
  volume       = {32},
  number       = {2},
  pages        = {101--103},
  year         = {2008},
  url          = {https://doi.org/10.1080/01611190801916634},
  doi          = {10.1080/01611190801916634},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Grajek08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/GreyS08,
  author       = {Christopher Grey and
                  Andrew Sturdy},
  title        = {The 1942 Reorganization of the Government Code and Cypher School},
  journal      = {Cryptologia},
  volume       = {32},
  number       = {4},
  pages        = {311--333},
  year         = {2008},
  url          = {https://doi.org/10.1080/01611190802114411},
  doi          = {10.1080/01611190802114411},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/GreyS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Hatch08,
  author       = {David A. Hatch},
  title        = {From the Archives: Friedman Takes the Stand},
  journal      = {Cryptologia},
  volume       = {32},
  number       = {2},
  pages        = {180--183},
  year         = {2008},
  url          = {https://doi.org/10.1080/01611190801916121},
  doi          = {10.1080/01611190801916121},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Hatch08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Holden08,
  author       = {Joshua Holden},
  title        = {Review of Complexity and Cryptography: An Introduction by John Talbot
                  and Dominic Welsh},
  journal      = {Cryptologia},
  volume       = {32},
  number       = {1},
  pages        = {92--97},
  year         = {2008},
  url          = {https://doi.org/10.1080/01611190701582619},
  doi          = {10.1080/01611190701582619},
  timestamp    = {Mon, 05 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Holden08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Jaworski08,
  author       = {Jerzy Jaworski},
  title        = {Rejewski-R{\'{o}}zycki-Zygalski Lectures in Computer Science},
  journal      = {Cryptologia},
  volume       = {32},
  number       = {4},
  pages        = {348--350},
  year         = {2008},
  url          = {https://doi.org/10.1080/01611190802253128},
  doi          = {10.1080/01611190802253128},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Jaworski08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kahn08,
  author       = {David Kahn},
  title        = {The Future of the Past - Questions in Cryptologic History},
  journal      = {Cryptologia},
  volume       = {32},
  number       = {1},
  pages        = {56--61},
  year         = {2008},
  url          = {https://doi.org/10.1080/01611190701752915},
  doi          = {10.1080/01611190701752915},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kahn08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Massey08,
  author       = {James L. Massey},
  title        = {Review of Series on Arabic Origins of Cryptology},
  journal      = {Cryptologia},
  volume       = {32},
  number       = {3},
  pages        = {280--283},
  year         = {2008},
  url          = {https://doi.org/10.1080/01611190802129104},
  doi          = {10.1080/01611190802129104},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Massey08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Melka08,
  author       = {Tomi S. Melka},
  title        = {Structural Observations Regarding \emph{RongoRongo} Tablet 'Keiti'},
  journal      = {Cryptologia},
  volume       = {32},
  number       = {2},
  pages        = {155--179},
  year         = {2008},
  url          = {https://doi.org/10.1080/01611190801911361},
  doi          = {10.1080/01611190801911361},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Melka08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Parakh08,
  author       = {Abhishek Parakh},
  title        = {Oblivious Transfer Based on Key Exchange},
  journal      = {Cryptologia},
  volume       = {32},
  number       = {1},
  pages        = {37--44},
  year         = {2008},
  url          = {https://doi.org/10.1080/01611190701593228},
  doi          = {10.1080/01611190701593228},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Parakh08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/PhanS08,
  author       = {Raphael Chung{-}Wei Phan and
                  Adi Shamir},
  title        = {Improved Related-key Attacks on Desx and Desx+},
  journal      = {Cryptologia},
  volume       = {32},
  number       = {1},
  pages        = {13--22},
  year         = {2008},
  url          = {https://doi.org/10.1080/01611190701743690},
  doi          = {10.1080/01611190701743690},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/PhanS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Schrodel08,
  author       = {Tobias Schr{\"{o}}del},
  title        = {Breaking Short Vigen{\`{e}}re Ciphers},
  journal      = {Cryptologia},
  volume       = {32},
  number       = {4},
  pages        = {334--347},
  year         = {2008},
  url          = {https://doi.org/10.1080/01611190802336097},
  doi          = {10.1080/01611190802336097},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Schrodel08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/SrikwanJ08,
  author       = {Sukamol Srikwan and
                  Markus Jakobsson},
  title        = {Using Cartoons to Teach Internet Security},
  journal      = {Cryptologia},
  volume       = {32},
  number       = {2},
  pages        = {137--154},
  year         = {2008},
  url          = {https://doi.org/10.1080/01611190701743724},
  doi          = {10.1080/01611190701743724},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/SrikwanJ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Winkel08,
  author       = {Brian J. Winkel},
  title        = {Lessons Learned from a Mathematical Cryptology Course},
  journal      = {Cryptologia},
  volume       = {32},
  number       = {1},
  pages        = {45--55},
  year         = {2008},
  url          = {https://doi.org/10.1080/01611190701489732},
  doi          = {10.1080/01611190701489732},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Winkel08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/X08,
  title        = {Can You Break the Nku Monopoly?},
  journal      = {Cryptologia},
  volume       = {32},
  number       = {2},
  pages        = {197},
  year         = {2008},
  url          = {https://doi.org/10.1080/01611190801920263},
  doi          = {10.1080/01611190801920263},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/X08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/YangC08,
  author       = {Ching{-}Nung Yang and
                  Tse{-}Shih Chen},
  title        = {Security Analysis of Authentication of Images Using Recursive Visual
                  Cryptography},
  journal      = {Cryptologia},
  volume       = {32},
  number       = {2},
  pages        = {131--136},
  year         = {2008},
  url          = {https://doi.org/10.1080/01611190701869669},
  doi          = {10.1080/01611190701869669},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/YangC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Alvarez07,
  author       = {David {\'{A}}lvarez},
  title        = {Wilhelm Fenner and the Development of the German Cipher Bureau, 1922-1939},
  journal      = {Cryptologia},
  volume       = {31},
  number       = {2},
  pages        = {152--163},
  year         = {2007},
  url          = {https://doi.org/10.1080/01611190601038225},
  doi          = {10.1080/01611190601038225},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Alvarez07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Bauer07,
  author       = {Craig P. Bauer},
  title        = {Letter from the Editor},
  journal      = {Cryptologia},
  volume       = {31},
  number       = {1},
  pages        = {1},
  year         = {2007},
  url          = {https://doi.org/10.1080/01611190601071986},
  doi          = {10.1080/01611190601071986},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Bauer07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Bauer07a,
  author       = {Craig P. Bauer},
  title        = {A Note of Thanks},
  journal      = {Cryptologia},
  volume       = {31},
  number       = {4},
  pages        = {368},
  year         = {2007},
  url          = {https://doi.org/10.1080/01611190701583427},
  doi          = {10.1080/01611190701583427},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Bauer07a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/BauerB07,
  author       = {Craig P. Bauer and
                  Joel Burkholder},
  title        = {From the Archives: Reading Stimson's Mail},
  journal      = {Cryptologia},
  volume       = {31},
  number       = {2},
  pages        = {179--184},
  year         = {2007},
  url          = {https://doi.org/10.1080/01611190701216499},
  doi          = {10.1080/01611190701216499},
  timestamp    = {Sat, 31 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/BauerB07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/BauerM07,
  author       = {Craig P. Bauer and
                  Katherine Millward},
  title        = {Cracking Matrix Encryption Row by Row},
  journal      = {Cryptologia},
  volume       = {31},
  number       = {1},
  pages        = {76--83},
  year         = {2007},
  url          = {https://doi.org/10.1080/01611190600947806},
  doi          = {10.1080/01611190600947806},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/BauerM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Buonafalce07,
  author       = {Augusto Buonafalce},
  title        = {Review of The Curse of the Voynich. The Secret History of the World's
                  Most Mysterious Manuscript by Nicholas Pelling},
  journal      = {Cryptologia},
  volume       = {31},
  number       = {4},
  pages        = {361--362},
  year         = {2007},
  url          = {https://doi.org/10.1080/01611190701244541},
  doi          = {10.1080/01611190701244541},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Buonafalce07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Burke07,
  author       = {Colin B. Burke},
  title        = {From the Archives: Codebreaking (or not) in Shanghai},
  journal      = {Cryptologia},
  volume       = {31},
  number       = {1},
  pages        = {84--86},
  year         = {2007},
  url          = {https://doi.org/10.1080/01611190601039686},
  doi          = {10.1080/01611190601039686},
  timestamp    = {Thu, 03 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Burke07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Bury07,
  author       = {Jan Bury},
  title        = {From the Archives: Polish Interwar Mfa's Cipher Compromised?},
  journal      = {Cryptologia},
  volume       = {31},
  number       = {3},
  pages        = {268--277},
  year         = {2007},
  url          = {https://doi.org/10.1080/01611190701399857},
  doi          = {10.1080/01611190701399857},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Bury07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Bury07a,
  author       = {Jan Bury},
  title        = {From the Archives: The {U.S.} and West German Agent Radio Ciphers},
  journal      = {Cryptologia},
  volume       = {31},
  number       = {4},
  pages        = {343--357},
  year         = {2007},
  url          = {https://doi.org/10.1080/01611190701578104},
  doi          = {10.1080/01611190701578104},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Bury07a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Christensen07,
  author       = {Chris Christensen},
  title        = {Review of Mathematical Ciphers from Caesar to Rsa by Anne L. Young},
  journal      = {Cryptologia},
  volume       = {31},
  number       = {2},
  pages        = {185--187},
  year         = {2007},
  url          = {https://doi.org/10.1080/01611190601185810},
  doi          = {10.1080/01611190601185810},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Christensen07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Christensen07a,
  author       = {Chris Christensen},
  title        = {Review of Decrypted Secrets: Methods and Maxims of Cryptology, Fourth
                  Edition by F. L. Bauer},
  journal      = {Cryptologia},
  volume       = {31},
  number       = {3},
  pages        = {281--283},
  year         = {2007},
  url          = {https://doi.org/10.1080/01611190701404962},
  doi          = {10.1080/01611190701404962},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Christensen07a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/ChristensenL07,
  author       = {Chris Christensen and
                  Robert E. Lewand},
  title        = {2008 Joint Mathematics Meetings Contributed Paper Session: Cryptology
                  for Undergraduates},
  journal      = {Cryptologia},
  volume       = {31},
  number       = {4},
  pages        = {367},
  year         = {2007},
  url          = {https://doi.org/10.1080/01611190701582775},
  doi          = {10.1080/01611190701582775},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/ChristensenL07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/David07,
  author       = {James David},
  title        = {Bourbon Operations in China following World War Ii},
  journal      = {Cryptologia},
  volume       = {31},
  number       = {3},
  pages        = {254--262},
  year         = {2007},
  url          = {https://doi.org/10.1080/01611190701313957},
  doi          = {10.1080/01611190701313957},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/David07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Dooley07,
  author       = {John F. Dooley},
  title        = {Reviews of Cryptologic Fiction},
  journal      = {Cryptologia},
  volume       = {31},
  number       = {2},
  pages        = {192--195},
  year         = {2007},
  url          = {https://doi.org/10.1080/01611190701216333},
  doi          = {10.1080/01611190701216333},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Dooley07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Dooley07a,
  author       = {John F. Dooley},
  title        = {Reviews of Cryptologic Fiction},
  journal      = {Cryptologia},
  volume       = {31},
  number       = {4},
  pages        = {363--366},
  year         = {2007},
  url          = {https://doi.org/10.1080/01611190701582353},
  doi          = {10.1080/01611190701582353},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Dooley07a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Esq07,
  author       = {Louis Kruh},
  title        = {Reviews and Things Cryptologic},
  journal      = {Cryptologia},
  volume       = {31},
  number       = {1},
  pages        = {92--94},
  year         = {2007},
  url          = {https://doi.org/10.1080/01611190601072257},
  doi          = {10.1080/01611190601072257},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Esq07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/EsqX07,
  author       = {Louis Kruh},
  title        = {Reviews and Things Cryptologic},
  journal      = {Cryptologia},
  volume       = {31},
  number       = {3},
  pages        = {284--287},
  year         = {2007},
  url          = {https://doi.org/10.1080/01611190701405357},
  doi          = {10.1080/01611190701405357},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/EsqX07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/FuensantaE07,
  author       = {Jos{\'{e}} Ram{\'{o}}n Soler Fuensanta and
                  Francisco Javier L{\'{o}}pez{-}Brea Espiau},
  title        = {The Strip Cipher-The Spanish Official Method},
  journal      = {Cryptologia},
  volume       = {31},
  number       = {1},
  pages        = {46--56},
  year         = {2007},
  url          = {https://doi.org/10.1080/01611190600954836},
  doi          = {10.1080/01611190600954836},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/FuensantaE07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Gathen07,
  author       = {Joachim von zur Gathen},
  title        = {Zimmermann Telegram: The Original Draft},
  journal      = {Cryptologia},
  volume       = {31},
  number       = {1},
  pages        = {2--37},
  year         = {2007},
  url          = {https://doi.org/10.1080/01611190600921165},
  doi          = {10.1080/01611190600921165},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Gathen07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Gladwin07,
  author       = {Lee A. Gladwin},
  title        = {Bulldozer: a Cribless Rapid Analytical Machine (ram) Solution to Enigma
                  and its Variations},
  journal      = {Cryptologia},
  volume       = {31},
  number       = {4},
  pages        = {305--315},
  year         = {2007},
  url          = {https://doi.org/10.1080/01611190701506022},
  doi          = {10.1080/01611190701506022},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Gladwin07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/GuptaSC07,
  author       = {Indivar Gupta and
                  Jasbir Singh and
                  Roopika Chaudhary},
  title        = {Cryptanalysis of an Extension of the Hill Cipher},
  journal      = {Cryptologia},
  volume       = {31},
  number       = {3},
  pages        = {246--253},
  year         = {2007},
  url          = {https://doi.org/10.1080/01611190701202465},
  doi          = {10.1080/01611190701202465},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/GuptaSC07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Hamer07,
  author       = {David Hamer},
  title        = {Review of Thirty Secret Years: {A.G.} Denniston's Work in Signals
                  Intelligence: 1914-1944 by Robin Denniston},
  journal      = {Cryptologia},
  volume       = {31},
  number       = {4},
  pages        = {358--360},
  year         = {2007},
  url          = {https://doi.org/10.1080/01611190701583088},
  doi          = {10.1080/01611190701583088},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Hamer07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Hatch07,
  author       = {David A. Hatch},
  title        = {The Punitive Expedition Military Reform and Communications Intelligence},
  journal      = {Cryptologia},
  volume       = {31},
  number       = {1},
  pages        = {38--45},
  year         = {2007},
  url          = {https://doi.org/10.1080/01611190600964264},
  doi          = {10.1080/01611190600964264},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Hatch07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Hoffman07,
  author       = {Nick Hoffman},
  title        = {A Simplified Idea Algorithm},
  journal      = {Cryptologia},
  volume       = {31},
  number       = {2},
  pages        = {143--151},
  year         = {2007},
  url          = {https://doi.org/10.1080/01611190701215640},
  doi          = {10.1080/01611190701215640},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Hoffman07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/HoldenerH07,
  author       = {Judy A. Holdener and
                  Eric J. Holdener},
  title        = {A Cryptographic Scavenger Hunt},
  journal      = {Cryptologia},
  volume       = {31},
  number       = {4},
  pages        = {316--323},
  year         = {2007},
  url          = {https://doi.org/10.1080/01611190701245050},
  doi          = {10.1080/01611190701245050},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/HoldenerH07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Jacobsen07,
  author       = {Philip H. Jacobsen},
  title        = {Station Al - Guadalcanal: a Full Service Wwii Cryptologic Unit},
  journal      = {Cryptologia},
  volume       = {31},
  number       = {1},
  pages        = {57--75},
  year         = {2007},
  url          = {https://doi.org/10.1080/01611190600921124},
  doi          = {10.1080/01611190600921124},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Jacobsen07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Jacobsen07a,
  author       = {Philip H. Jacobsen},
  title        = {Radio Silence of the Pearl Harbor Strike Force Confirmed Again: the
                  Saga of Secret Message Serial (sms) Numbers},
  journal      = {Cryptologia},
  volume       = {31},
  number       = {3},
  pages        = {223--232},
  year         = {2007},
  url          = {https://doi.org/10.1080/01611190701313940},
  doi          = {10.1080/01611190701313940},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Jacobsen07a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Joyner07,
  author       = {David Joyner},
  title        = {Review of Authentication Codes and Combinatorial Designs by Dingyi
                  Pei},
  journal      = {Cryptologia},
  volume       = {31},
  number       = {1},
  pages        = {89--91},
  year         = {2007},
  url          = {https://doi.org/10.1080/01611190600961443},
  doi          = {10.1080/01611190600961443},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Joyner07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kahn07,
  author       = {David Kahn},
  title        = {The Old Master of Austrian Cryptology},
  journal      = {Cryptologia},
  volume       = {31},
  number       = {2},
  pages        = {188--191},
  year         = {2007},
  url          = {https://doi.org/10.1080/01611190701216341},
  doi          = {10.1080/01611190701216341},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kahn07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kahn07a,
  author       = {David Kahn},
  title        = {Histoire Cryptologique - {A} Book Review},
  journal      = {Cryptologia},
  volume       = {31},
  number       = {3},
  pages        = {278--280},
  year         = {2007},
  url          = {https://doi.org/10.1080/01611190701244335},
  doi          = {10.1080/01611190701244335},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kahn07a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kruh07,
  author       = {Louis Kruh},
  title        = {Reviews and Things Cryptologic},
  journal      = {Cryptologia},
  volume       = {31},
  number       = {2},
  pages        = {196--200},
  year         = {2007},
  url          = {https://doi.org/10.1080/01611190701215392},
  doi          = {10.1080/01611190701215392},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kruh07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kuhl07,
  author       = {Alex Kuhl},
  title        = {Rejewski's Catalog},
  journal      = {Cryptologia},
  volume       = {31},
  number       = {4},
  pages        = {326--331},
  year         = {2007},
  url          = {https://doi.org/10.1080/01611190701299487},
  doi          = {10.1080/01611190701299487},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kuhl07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Lewand07,
  author       = {Robert E. Lewand},
  title        = {A Cryptology Course at Bletchley Park},
  journal      = {Cryptologia},
  volume       = {31},
  number       = {2},
  pages        = {108--111},
  year         = {2007},
  url          = {https://doi.org/10.1080/01611190601013582},
  doi          = {10.1080/01611190601013582},
  timestamp    = {Mon, 29 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Lewand07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/MachiaveloR07,
  author       = {Ant{\'{o}}nio Machiavelo and
                  Rog{\'{e}}rio Reis},
  title        = {Automated Ciphertext - Only Cryptanalysis of the Bifid Cipher},
  journal      = {Cryptologia},
  volume       = {31},
  number       = {2},
  pages        = {112--124},
  year         = {2007},
  url          = {https://doi.org/10.1080/01611190601134222},
  doi          = {10.1080/01611190601134222},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/MachiaveloR07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/MarnasAB07,
  author       = {Stelios I. Marnas and
                  Lefteris Angelis and
                  Georgios L. Bleris},
  title        = {An Application of Quasigroups in All-Or-Nothing Transform},
  journal      = {Cryptologia},
  volume       = {31},
  number       = {2},
  pages        = {133--142},
  year         = {2007},
  url          = {https://doi.org/10.1080/01611190601186255},
  doi          = {10.1080/01611190601186255},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/MarnasAB07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Mills07,
  author       = {Donald Mills},
  title        = {Review of Cryptography: Theory and Practice by D. R. Stinson},
  journal      = {Cryptologia},
  volume       = {31},
  number       = {1},
  pages        = {87--88},
  year         = {2007},
  url          = {https://doi.org/10.1080/01611190600964785},
  doi          = {10.1080/01611190600964785},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Mills07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Olson07,
  author       = {Edwin Olson},
  title        = {Robust Dictionary Attack of Short Simple Substitution Ciphers},
  journal      = {Cryptologia},
  volume       = {31},
  number       = {4},
  pages        = {332--342},
  year         = {2007},
  url          = {https://doi.org/10.1080/01611190701272369},
  doi          = {10.1080/01611190701272369},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Olson07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Parakh07,
  author       = {Abhishek Parakh},
  title        = {Oblivious Transfer Using Elliptic Curves},
  journal      = {Cryptologia},
  volume       = {31},
  number       = {2},
  pages        = {125--132},
  year         = {2007},
  url          = {https://doi.org/10.1080/01611190601144478},
  doi          = {10.1080/01611190601144478},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Parakh07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Paulis07,
  author       = {Herbert Paulis},
  title        = {The Scheuble Apparatus},
  journal      = {Cryptologia},
  volume       = {31},
  number       = {2},
  pages        = {164--178},
  year         = {2007},
  url          = {https://doi.org/10.1080/01611190601013624},
  doi          = {10.1080/01611190601013624},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Paulis07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Rislakki07,
  author       = {Jukka Rislakki},
  title        = {Searching for Cryptology's Great Wreck},
  journal      = {Cryptologia},
  volume       = {31},
  number       = {3},
  pages        = {263--267},
  year         = {2007},
  url          = {https://doi.org/10.1080/01611190701244392},
  doi          = {10.1080/01611190701244392},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Rislakki07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Schinner07,
  author       = {Andreas Schinner},
  title        = {The Voynich Manuscript: Evidence of the Hoax Hypothesis},
  journal      = {Cryptologia},
  volume       = {31},
  number       = {2},
  pages        = {95--107},
  year         = {2007},
  url          = {https://doi.org/10.1080/01611190601133539},
  doi          = {10.1080/01611190601133539},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Schinner07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Shepherd07,
  author       = {Simon J. Shepherd},
  title        = {The Tiny Encryption Algorithm},
  journal      = {Cryptologia},
  volume       = {31},
  number       = {3},
  pages        = {233--245},
  year         = {2007},
  url          = {https://doi.org/10.1080/01611190601090606},
  doi          = {10.1080/01611190601090606},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Shepherd07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Sibert07,
  author       = {Olin Sibert},
  title        = {Robert W. Baldwin, 1957-2007},
  journal      = {Cryptologia},
  volume       = {31},
  number       = {4},
  pages        = {289--291},
  year         = {2007},
  url          = {https://doi.org/10.1080/01611190701653279},
  doi          = {10.1080/01611190701653279},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Sibert07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/SibertB07,
  author       = {W. Olin Sibert and
                  Robert W. Baldwin},
  title        = {The Multics encipher{\_}Algorithm},
  journal      = {Cryptologia},
  volume       = {31},
  number       = {4},
  pages        = {292--304},
  year         = {2007},
  url          = {https://doi.org/10.1080/01611190701506105},
  doi          = {10.1080/01611190701506105},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/SibertB07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/StampC07,
  author       = {Mark Stamp and
                  Wing On Chan},
  title        = {Sigaba: Cryptanalysis of the Full Keyspace},
  journal      = {Cryptologia},
  volume       = {31},
  number       = {3},
  pages        = {201--222},
  year         = {2007},
  url          = {https://doi.org/10.1080/01611190701394650},
  doi          = {10.1080/01611190701394650},
  timestamp    = {Mon, 13 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/StampC07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Zhong07,
  author       = {Sheng Zhong},
  title        = {An Attack on the Zhou-Fan-Li Authenticated Multiple-Key Agreement
                  Protocol},
  journal      = {Cryptologia},
  volume       = {31},
  number       = {4},
  pages        = {324--325},
  year         = {2007},
  url          = {https://doi.org/10.1080/01611190701548180},
  doi          = {10.1080/01611190701548180},
  timestamp    = {Wed, 02 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Zhong07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/BauerU06,
  author       = {Craig P. Bauer and
                  John Ulrich},
  title        = {The Cryptologic Contributions of Dr. Donald Menzel},
  journal      = {Cryptologia},
  volume       = {30},
  number       = {4},
  pages        = {306--339},
  year         = {2006},
  url          = {https://doi.org/10.1080/01611190600920951},
  doi          = {10.1080/01611190600920951},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/BauerU06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Biard06,
  author       = {Forrest R. Biard},
  title        = {Breaking of Japanese Naval Codes: Pre-Pearl Harbor to Midway},
  journal      = {Cryptologia},
  volume       = {30},
  number       = {2},
  pages        = {151--158},
  year         = {2006},
  url          = {https://doi.org/10.1080/01611190500380074},
  doi          = {10.1080/01611190500380074},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Biard06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Blackman06,
  author       = {Deane R. Blackman},
  title        = {Note on Geheimschreiber Cam Wheels},
  journal      = {Cryptologia},
  volume       = {30},
  number       = {1},
  pages        = {53--54},
  year         = {2006},
  url          = {https://doi.org/10.1080/01611190500371818},
  doi          = {10.1080/01611190500371818},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Blackman06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Boklan06,
  author       = {Kent D. Boklan},
  title        = {How {I} Broke the Confederate Code {(137} Years Too Late)},
  journal      = {Cryptologia},
  volume       = {30},
  number       = {4},
  pages        = {340--345},
  year         = {2006},
  url          = {https://doi.org/10.1080/01611190600826729},
  doi          = {10.1080/01611190600826729},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Boklan06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Brawley06,
  author       = {Joel V. Brawley},
  title        = {In Memory of Jack Levine {(1907-2005)}},
  journal      = {Cryptologia},
  volume       = {30},
  number       = {2},
  pages        = {83--97},
  year         = {2006},
  url          = {https://doi.org/10.1080/01611190600557050},
  doi          = {10.1080/01611190600557050},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Brawley06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Buonafalce06,
  author       = {Augusto Buonafalce},
  title        = {Bellaso's Reciprocal Ciphers},
  journal      = {Cryptologia},
  volume       = {30},
  number       = {1},
  pages        = {39--51},
  year         = {2006},
  url          = {https://doi.org/10.1080/01611190500383581},
  doi          = {10.1080/01611190500383581},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Buonafalce06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/BuonafalceFT06,
  author       = {Augusto Buonafalce and
                  Niels Faurholt and
                  Bjarne Toft},
  title        = {Julius Petersen - Danish Mathematician and Cryptologist},
  journal      = {Cryptologia},
  volume       = {30},
  number       = {4},
  pages        = {353--360},
  year         = {2006},
  url          = {https://doi.org/10.1080/01611190600920969},
  doi          = {10.1080/01611190600920969},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/BuonafalceFT06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Bury06,
  author       = {Jan Bury},
  title        = {Telma - a Polish Wireless Communications Security Machine of World
                  War Ii},
  journal      = {Cryptologia},
  volume       = {30},
  number       = {1},
  pages        = {31--38},
  year         = {2006},
  url          = {https://doi.org/10.1080/01611190500401102},
  doi          = {10.1080/01611190500401102},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Bury06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Donovan06,
  author       = {Peter W. Donovan},
  title        = {The Indicators of Japanese Ciphers 2468, 7890, and Jn-25a1},
  journal      = {Cryptologia},
  volume       = {30},
  number       = {3},
  pages        = {212--235},
  year         = {2006},
  url          = {https://doi.org/10.1080/01611190500544695},
  doi          = {10.1080/01611190500544695},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Donovan06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Erskine06,
  author       = {Ralph Erskine},
  title        = {The 1944 Naval Brusa Agreement and its Aftermath},
  journal      = {Cryptologia},
  volume       = {30},
  number       = {1},
  pages        = {1--22},
  year         = {2006},
  url          = {https://doi.org/10.1080/01611190500401086},
  doi          = {10.1080/01611190500401086},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Erskine06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Erskine06a,
  author       = {Ralph Erskine},
  title        = {The Poles Reveal their Secrets: Alastair Denniston's Account of the
                  July 1939 Meeting at Pyry},
  journal      = {Cryptologia},
  volume       = {30},
  number       = {4},
  pages        = {294--305},
  year         = {2006},
  url          = {https://doi.org/10.1080/01611190600920944},
  doi          = {10.1080/01611190600920944},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Erskine06a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Faurholt06,
  author       = {Niels Faurholt},
  title        = {Alexis K{\o}hl: a Danish Inventor of Cryptosystems},
  journal      = {Cryptologia},
  volume       = {30},
  number       = {1},
  pages        = {23--29},
  year         = {2006},
  url          = {https://doi.org/10.1080/01611190500380066},
  doi          = {10.1080/01611190500380066},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Faurholt06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Freeman06,
  author       = {Peter Freeman},
  title        = {The Zimmermann Telegram Revisited: {A} Reconciliation of the Primary
                  Sources},
  journal      = {Cryptologia},
  volume       = {30},
  number       = {2},
  pages        = {98--150},
  year         = {2006},
  url          = {https://doi.org/10.1080/01611190500428634},
  doi          = {10.1080/01611190500428634},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Freeman06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Gallehawk06,
  author       = {John Gallehawk},
  title        = {Third Person Singular (Warsaw, 1939)},
  journal      = {Cryptologia},
  volume       = {30},
  number       = {3},
  pages        = {193--198},
  year         = {2006},
  url          = {https://doi.org/10.1080/01611190600612129},
  doi          = {10.1080/01611190600612129},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Gallehawk06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Gladwin06,
  author       = {Lee A. Gladwin},
  title        = {Did Sigint Seal the Fates of 19, 000 Pows?},
  journal      = {Cryptologia},
  volume       = {30},
  number       = {3},
  pages        = {199--211},
  year         = {2006},
  url          = {https://doi.org/10.1080/01611190600724387},
  doi          = {10.1080/01611190600724387},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Gladwin06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Griffing06,
  author       = {Alexander Griffing},
  title        = {Solving Xor Plaintext Strings with the Viterbi Algorithm},
  journal      = {Cryptologia},
  volume       = {30},
  number       = {3},
  pages        = {258--265},
  year         = {2006},
  url          = {https://doi.org/10.1080/01611190600630386},
  doi          = {10.1080/01611190600630386},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Griffing06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Griffing06a,
  author       = {Alexander Griffing},
  title        = {Solving the Running Key Cipher with the Viterbi Algorithm},
  journal      = {Cryptologia},
  volume       = {30},
  number       = {4},
  pages        = {361--367},
  year         = {2006},
  url          = {https://doi.org/10.1080/01611190600789117},
  doi          = {10.1080/01611190600789117},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Griffing06a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/HoldenLMH06,
  author       = {Joshua Holden and
                  Richard Layton and
                  Laurence D. Merkle and
                  Tina A. Hudson},
  title        = {Underwater Hacker Missile Wars: {A} Cryptography and Engineering Contest},
  journal      = {Cryptologia},
  volume       = {30},
  number       = {1},
  pages        = {69--77},
  year         = {2006},
  url          = {https://doi.org/10.1080/01611190500401144},
  doi          = {10.1080/01611190500401144},
  timestamp    = {Thu, 23 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/HoldenLMH06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/JoynerK06,
  author       = {David Joyner and
                  David Kahn},
  title        = {Edited Transcript of Interview with Peter Hilton for "Secrets of War"},
  journal      = {Cryptologia},
  volume       = {30},
  number       = {3},
  pages        = {236--250},
  year         = {2006},
  url          = {https://doi.org/10.1080/01611190500379894},
  doi          = {10.1080/01611190500379894},
  timestamp    = {Sat, 16 Sep 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/JoynerK06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kruh06,
  author       = {Louis Kruh},
  title        = {Reviews and Things Cryptologic},
  journal      = {Cryptologia},
  volume       = {30},
  number       = {1},
  pages        = {79--81},
  year         = {2006},
  url          = {https://doi.org/10.1080/01611190500403702},
  doi          = {10.1080/01611190500403702},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kruh06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kruh06a,
  author       = {Louis Kruh},
  title        = {Reviews and Things Cryptologic},
  journal      = {Cryptologia},
  volume       = {30},
  number       = {2},
  pages        = {181--192},
  year         = {2006},
  url          = {https://doi.org/10.1080/01611190600548042},
  doi          = {10.1080/01611190600548042},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kruh06a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kruh06b,
  author       = {Louis Kruh},
  title        = {Reviews and Things Cryptologic},
  journal      = {Cryptologia},
  volume       = {30},
  number       = {3},
  pages        = {287--291},
  year         = {2006},
  url          = {https://doi.org/10.1080/01611190600726341},
  doi          = {10.1080/01611190600726341},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kruh06b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kruh06c,
  author       = {Louis Kruh},
  title        = {Reviews and Things Cryptologic},
  journal      = {Cryptologia},
  volume       = {30},
  number       = {4},
  pages        = {370--374},
  year         = {2006},
  url          = {https://doi.org/10.1080/01611190600921058},
  doi          = {10.1080/01611190600921058},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kruh06c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Mills06,
  author       = {Donald Mills},
  title        = {Review of \emph{Introduction to Coding Theory} by Ron M. Roth},
  journal      = {Cryptologia},
  volume       = {30},
  number       = {4},
  pages        = {368--369},
  year         = {2006},
  url          = {https://doi.org/10.1080/01611190600921041},
  doi          = {10.1080/01611190600921041},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Mills06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/OliveiraXC06,
  author       = {Claudia Oliveira and
                  Jos{\'{e}} Ant{\^{o}}nio Xex{\'{e}}o and
                  Carlos Andr{\'{e}} Carvalho},
  title        = {Clustering and Categorization Applied to Cryptanalysis},
  journal      = {Cryptologia},
  volume       = {30},
  number       = {3},
  pages        = {266--280},
  year         = {2006},
  url          = {https://doi.org/10.1080/01611190600694457},
  doi          = {10.1080/01611190600694457},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/OliveiraXC06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/PenumarthiK06,
  author       = {Kiranmayi Penumarthi and
                  Subhash C. Kak},
  title        = {Augmented Watermarking},
  journal      = {Cryptologia},
  volume       = {30},
  number       = {2},
  pages        = {173--180},
  year         = {2006},
  url          = {https://doi.org/10.1080/01611190500541824},
  doi          = {10.1080/01611190500541824},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/PenumarthiK06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Pommerening06,
  author       = {Klaus Pommerening},
  title        = {Kasiski's Test: Couldn't the Repetitions be by Accident?},
  journal      = {Cryptologia},
  volume       = {30},
  number       = {4},
  pages        = {346--352},
  year         = {2006},
  url          = {https://doi.org/10.1080/01611190600803819},
  doi          = {10.1080/01611190600803819},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Pommerening06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Schmeh06,
  author       = {Klaus Schmeh},
  title        = {The East German Encryption Machine {T-310} and the Algorithm It Used},
  journal      = {Cryptologia},
  volume       = {30},
  number       = {3},
  pages        = {251--257},
  year         = {2006},
  url          = {https://doi.org/10.1080/01611190600632457},
  doi          = {10.1080/01611190600632457},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Schmeh06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Simons06,
  author       = {John L. Simons},
  title        = {Bridge Cryptography Fundamentals},
  journal      = {Cryptologia},
  volume       = {30},
  number       = {3},
  pages        = {281--286},
  year         = {2006},
  url          = {https://doi.org/10.1080/01611190600726358},
  doi          = {10.1080/01611190600726358},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Simons06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Stallings06,
  author       = {William Stallings},
  title        = {The Whirlpool Secure Hash Function},
  journal      = {Cryptologia},
  volume       = {30},
  number       = {1},
  pages        = {55--67},
  year         = {2006},
  url          = {https://doi.org/10.1080/01611190500380090},
  doi          = {10.1080/01611190500380090},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Stallings06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Talbert06,
  author       = {Robert Talbert},
  title        = {The Cycle Structure and Order of the Rail Fence Cipher},
  journal      = {Cryptologia},
  volume       = {30},
  number       = {2},
  pages        = {159--172},
  year         = {2006},
  url          = {https://doi.org/10.1080/01611190500380082},
  doi          = {10.1080/01611190500380082},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Talbert06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Winkel06,
  author       = {Brian J. Winkel},
  title        = {Letter from the Editor},
  journal      = {Cryptologia},
  volume       = {30},
  number       = {4},
  pages        = {293},
  year         = {2006},
  url          = {https://doi.org/10.1080/01611190600921132},
  doi          = {10.1080/01611190600921132},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Winkel06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/BauerG05,
  author       = {Craig P. Bauer and
                  Suzanne E. Gladfelter},
  title        = {Cryptology in York Pennsylvania},
  journal      = {Cryptologia},
  volume       = {29},
  number       = {2},
  pages        = {159--175},
  year         = {2005},
  url          = {https://doi.org/10.1080/0161-110591893861},
  doi          = {10.1080/0161-110591893861},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/BauerG05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/BauerG05a,
  author       = {Craig P. Bauer and
                  Elliott J. Gottloeb},
  title        = {Results of an Automated Attack on the Running Key Cipher},
  journal      = {Cryptologia},
  volume       = {29},
  number       = {3},
  pages        = {248--254},
  year         = {2005},
  url          = {https://doi.org/10.1080/01611190508951301},
  doi          = {10.1080/01611190508951301},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/BauerG05a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Bruckner05,
  author       = {Hilmar{-}Detlef Br{\"{u}}ckner},
  title        = {Germany's First Cryptanalysis on the Western Front: Decrypting British
                  and French Naval Ciphers in World War {I}},
  journal      = {Cryptologia},
  volume       = {29},
  number       = {1},
  pages        = {1--22},
  year         = {2005},
  url          = {https://doi.org/10.1080/0161-110591893735},
  doi          = {10.1080/0161-110591893735},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Bruckner05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/CooperA05,
  author       = {Rodney H. Cooper and
                  Christopher G. Andrews},
  title        = {The Public Key Covert Channel},
  journal      = {Cryptologia},
  volume       = {29},
  number       = {1},
  pages        = {73--75},
  year         = {2005},
  url          = {https://doi.org/10.1080/0161-110591893780},
  doi          = {10.1080/0161-110591893780},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/CooperA05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/CorderyP05,
  author       = {Robert Cordery and
                  Leon Pintsov},
  title        = {History and Role of Information Security in Postage Evidencing and
                  Payment},
  journal      = {Cryptologia},
  volume       = {29},
  number       = {3},
  pages        = {257--271},
  year         = {2005},
  url          = {https://doi.org/10.1080/01611190508951303},
  doi          = {10.1080/01611190508951303},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/CorderyP05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Dooley05,
  author       = {John F. Dooley},
  title        = {Codes and Ciphers in Fiction: an Overview},
  journal      = {Cryptologia},
  volume       = {29},
  number       = {4},
  pages        = {290--328},
  year         = {2005},
  url          = {https://doi.org/10.1080/0161-110591893898},
  doi          = {10.1080/0161-110591893898},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Dooley05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Gladwin05,
  author       = {Lee A. Gladwin},
  title        = {The Diplomacy of Security: behind the Negotiations of Article 18 of
                  the Sino-american Cooperative Agreement},
  journal      = {Cryptologia},
  volume       = {29},
  number       = {1},
  pages        = {23--42},
  year         = {2005},
  url          = {https://doi.org/10.1080/0161-110591893744},
  doi          = {10.1080/0161-110591893744},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Gladwin05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Ingerman05,
  author       = {Peter Zilahy Ingerman},
  title        = {Two Hebern Cryptographic Machines},
  journal      = {Cryptologia},
  volume       = {29},
  number       = {2},
  pages        = {127--147},
  year         = {2005},
  url          = {https://doi.org/10.1080/0161-110591893843},
  doi          = {10.1080/0161-110591893843},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Ingerman05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Jacobsen05,
  author       = {Philip H. Jacobsen},
  title        = {Pearl Harbor: Radio Officer Leslie Grogan of the Ss Lurline and his
                  Misidentified Signals},
  journal      = {Cryptologia},
  volume       = {29},
  number       = {2},
  pages        = {97--120},
  year         = {2005},
  url          = {https://doi.org/10.1080/0161-110591893825},
  doi          = {10.1080/0161-110591893825},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Jacobsen05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kahn05,
  author       = {David Kahn},
  title        = {The Man in the Iron Mask - Encore Et Enfin, Cryptologically},
  journal      = {Cryptologia},
  volume       = {29},
  number       = {1},
  pages        = {43--49},
  year         = {2005},
  url          = {https://doi.org/10.1080/0161-110591893753},
  doi          = {10.1080/0161-110591893753},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kahn05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kahn05a,
  author       = {David Kahn},
  title        = {From the Archives: Codetalkers not Wanted},
  journal      = {Cryptologia},
  volume       = {29},
  number       = {1},
  pages        = {76--87},
  year         = {2005},
  url          = {https://doi.org/10.1080/0161-110591893799},
  doi          = {10.1080/0161-110591893799},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kahn05a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kahn05b,
  author       = {David Kahn},
  title        = {David Shulman Dies - the Bibliographer of Cryptology},
  journal      = {Cryptologia},
  volume       = {29},
  number       = {1},
  pages        = {94--95},
  year         = {2005},
  url          = {https://doi.org/10.1080/0161-110591893816},
  doi          = {10.1080/0161-110591893816},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kahn05b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kahn05c,
  author       = {David Kahn},
  title        = {The Polish Enigma Conference and some Excursions},
  journal      = {Cryptologia},
  volume       = {29},
  number       = {2},
  pages        = {121--126},
  year         = {2005},
  url          = {https://doi.org/10.1080/0161-110591893834},
  doi          = {10.1080/0161-110591893834},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kahn05c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kahn05d,
  author       = {David Kahn},
  title        = {How Garbles Tickled History},
  journal      = {Cryptologia},
  volume       = {29},
  number       = {4},
  pages        = {329--336},
  year         = {2005},
  url          = {https://doi.org/10.1080/0161-110591893906},
  doi          = {10.1080/0161-110591893906},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kahn05d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kruh05,
  author       = {Louis Kruh},
  title        = {Reviews and Things Cryptologic},
  journal      = {Cryptologia},
  volume       = {29},
  number       = {1},
  pages        = {88--93},
  year         = {2005},
  url          = {https://doi.org/10.1080/0161-110591893807},
  doi          = {10.1080/0161-110591893807},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kruh05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kruh05a,
  author       = {Louis Kruh},
  title        = {Reviews and Things Cryptologic},
  journal      = {Cryptologia},
  volume       = {29},
  number       = {2},
  pages        = {176--187},
  year         = {2005},
  url          = {https://doi.org/10.1080/0161-110591893870},
  doi          = {10.1080/0161-110591893870},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kruh05a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kruh05b,
  author       = {Louis Kruh},
  title        = {Unknown Military Coding Device Can You Identify It?},
  journal      = {Cryptologia},
  volume       = {29},
  number       = {2},
  pages        = {190--191},
  year         = {2005},
  url          = {https://doi.org/10.1080/0161-110591893889},
  doi          = {10.1080/0161-110591893889},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kruh05b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kruh05c,
  author       = {Louis Kruh},
  title        = {Enigma Articles from Cryptologia},
  journal      = {Cryptologia},
  volume       = {29},
  number       = {3},
  pages        = {272--273},
  year         = {2005},
  url          = {https://doi.org/10.1080/01611190508951304},
  doi          = {10.1080/01611190508951304},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kruh05c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kruh05d,
  author       = {Louis Kruh},
  title        = {Crypto User's Guide},
  journal      = {Cryptologia},
  volume       = {29},
  number       = {3},
  pages        = {273},
  year         = {2005},
  url          = {https://doi.org/10.1080/01611190508951305},
  doi          = {10.1080/01611190508951305},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kruh05d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kruh05e,
  author       = {Louis Kruh},
  title        = {Confederate Treasure Issues},
  journal      = {Cryptologia},
  volume       = {29},
  number       = {3},
  pages        = {274},
  year         = {2005},
  url          = {https://doi.org/10.1080/01611190508951306},
  doi          = {10.1080/01611190508951306},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kruh05e.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kruh05f,
  author       = {Louis Kruh},
  title        = {Detective Notebook for Young Adults},
  journal      = {Cryptologia},
  volume       = {29},
  number       = {3},
  pages        = {274--275},
  year         = {2005},
  url          = {https://doi.org/10.1080/01611190508951307},
  doi          = {10.1080/01611190508951307},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kruh05f.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kruh05g,
  author       = {Louis Kruh},
  title        = {College-level Math Crypto Text},
  journal      = {Cryptologia},
  volume       = {29},
  number       = {3},
  pages        = {275},
  year         = {2005},
  url          = {https://doi.org/10.1080/01611190508951308},
  doi          = {10.1080/01611190508951308},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kruh05g.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kruh05h,
  author       = {Louis Kruh},
  title        = {Code Names Post 9/11},
  journal      = {Cryptologia},
  volume       = {29},
  number       = {3},
  pages        = {276},
  year         = {2005},
  url          = {https://doi.org/10.1080/01611190508951309},
  doi          = {10.1080/01611190508951309},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kruh05h.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kruh05i,
  author       = {Louis Kruh},
  title        = {Coral Sea, Midway, and Aleutians Naval Intelligence},
  journal      = {Cryptologia},
  volume       = {29},
  number       = {3},
  pages        = {276--277},
  year         = {2005},
  url          = {https://doi.org/10.1080/01611190508951310},
  doi          = {10.1080/01611190508951310},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kruh05i.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kruh05j,
  author       = {Louis Kruh},
  title        = {Broad View of Power of Mathematics},
  journal      = {Cryptologia},
  volume       = {29},
  number       = {3},
  pages        = {277--278},
  year         = {2005},
  url          = {https://doi.org/10.1080/01611190508951311},
  doi          = {10.1080/01611190508951311},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kruh05j.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kruh05k,
  author       = {Louis Kruh},
  title        = {Friedman Legacy},
  journal      = {Cryptologia},
  volume       = {29},
  number       = {3},
  pages        = {278},
  year         = {2005},
  url          = {https://doi.org/10.1080/01611190508951312},
  doi          = {10.1080/01611190508951312},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kruh05k.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kruh05l,
  author       = {Louis Kruh},
  title        = {Pearl Harbor Revisited},
  journal      = {Cryptologia},
  volume       = {29},
  number       = {3},
  pages        = {278--279},
  year         = {2005},
  url          = {https://doi.org/10.1080/01611190508951313},
  doi          = {10.1080/01611190508951313},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kruh05l.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kruh05m,
  author       = {Louis Kruh},
  title        = {Global Eavesdropping},
  journal      = {Cryptologia},
  volume       = {29},
  number       = {3},
  pages        = {279--280},
  year         = {2005},
  url          = {https://doi.org/10.1080/01611190508951314},
  doi          = {10.1080/01611190508951314},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kruh05m.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kruh05n,
  author       = {Louis Kruh},
  title        = {Cryptology in American History},
  journal      = {Cryptologia},
  volume       = {29},
  number       = {3},
  pages        = {280},
  year         = {2005},
  url          = {https://doi.org/10.1080/01611190508951315},
  doi          = {10.1080/01611190508951315},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kruh05n.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kruh05o,
  author       = {Louis Kruh},
  title        = {Hms Dunedin Acts on Enigma Material},
  journal      = {Cryptologia},
  volume       = {29},
  number       = {3},
  pages        = {280--281},
  year         = {2005},
  url          = {https://doi.org/10.1080/01611190508951316},
  doi          = {10.1080/01611190508951316},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kruh05o.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kruh05p,
  author       = {Louis Kruh},
  title        = {Novel Secrets},
  journal      = {Cryptologia},
  volume       = {29},
  number       = {3},
  pages        = {281--282},
  year         = {2005},
  url          = {https://doi.org/10.1080/01611190508951317},
  doi          = {10.1080/01611190508951317},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kruh05p.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kruh05q,
  author       = {Louis Kruh},
  title        = {Reviews and Things Cryptologic},
  journal      = {Cryptologia},
  volume       = {29},
  number       = {4},
  pages        = {377--380},
  year         = {2005},
  url          = {https://doi.org/10.1080/0161-110591893942},
  doi          = {10.1080/0161-110591893942},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kruh05q.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Lawrence05,
  author       = {John Lawrence},
  title        = {A Study of Rejewski's Equations},
  journal      = {Cryptologia},
  volume       = {29},
  number       = {3},
  pages        = {233--247},
  year         = {2005},
  url          = {https://doi.org/10.1080/01611190508951300},
  doi          = {10.1080/01611190508951300},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Lawrence05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Lawrence05a,
  author       = {John Lawrence},
  title        = {Factoring for the Plugboard - Was Rejewski's Proposed Solution for
                  Breaking the Enigma Feasible?},
  journal      = {Cryptologia},
  volume       = {29},
  number       = {4},
  pages        = {343--366},
  year         = {2005},
  url          = {https://doi.org/10.1080/0161-110591893924},
  doi          = {10.1080/0161-110591893924},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Lawrence05a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/MandhaniK05,
  author       = {Navneet Mandhani and
                  Subhash C. Kak},
  title        = {Watermarking Using Decimal Sequences},
  journal      = {Cryptologia},
  volume       = {29},
  number       = {1},
  pages        = {50--58},
  year         = {2005},
  url          = {https://doi.org/10.1080/0161-110591893762},
  doi          = {10.1080/0161-110591893762},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/MandhaniK05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/OverbeyTW05,
  author       = {Jeffrey Overbey and
                  William N. Traves and
                  Jerzy Wojdylo},
  title        = {On the Keyspace of the Hill Cipher},
  journal      = {Cryptologia},
  volume       = {29},
  number       = {1},
  pages        = {59--72},
  year         = {2005},
  url          = {https://doi.org/10.1080/0161-110591893771},
  doi          = {10.1080/0161-110591893771},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/OverbeyTW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Pekelney05,
  author       = {Richard Pekelney},
  title        = {Excellent, Exceptional, Enormous Crypto Source},
  journal      = {Cryptologia},
  volume       = {29},
  number       = {3},
  pages        = {255--256},
  year         = {2005},
  url          = {https://doi.org/10.1080/01611190508951302},
  doi          = {10.1080/01611190508951302},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Pekelney05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Phan05,
  author       = {Raphael C.{-}W. Phan},
  title        = {How to Explain Block Cipher Cryptanalysis to your Kids},
  journal      = {Cryptologia},
  volume       = {29},
  number       = {2},
  pages        = {148--158},
  year         = {2005},
  url          = {https://doi.org/10.1080/0161-110591893852},
  doi          = {10.1080/0161-110591893852},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Phan05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Rocca05,
  author       = {Charles F. Rocca},
  title        = {Cryptology in General Education},
  journal      = {Cryptologia},
  volume       = {29},
  number       = {4},
  pages        = {337--342},
  year         = {2005},
  url          = {https://doi.org/10.1080/0161-110591893915},
  doi          = {10.1080/0161-110591893915},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Rocca05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/SullivanW05,
  author       = {Geoff Sullivan and
                  Frode Weierud},
  title        = {Breaking German Army Ciphers},
  journal      = {Cryptologia},
  volume       = {29},
  number       = {3},
  pages        = {193--232},
  year         = {2005},
  url          = {https://doi.org/10.1080/01611190508951299},
  doi          = {10.1080/01611190508951299},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/SullivanW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/ThilakaR05,
  author       = {B. Thilaka and
                  K. Rajalakshmi},
  title        = {An Extension of Hill Cipher Using Generalised Inverses and Mth Residue
                  Modulo {N}},
  journal      = {Cryptologia},
  volume       = {29},
  number       = {4},
  pages        = {367--376},
  year         = {2005},
  url          = {https://doi.org/10.1080/0161-110591893933},
  doi          = {10.1080/0161-110591893933},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/ThilakaR05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Al-Ubaidy04,
  author       = {Mahmood Khalel Ibrahem Al{-}Ubaidy},
  title        = {Black-Box Attack Using Neuro-Identifier},
  journal      = {Cryptologia},
  volume       = {28},
  number       = {4},
  pages        = {358--372},
  year         = {2004},
  url          = {https://doi.org/10.1080/0161-110491892980},
  doi          = {10.1080/0161-110491892980},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Al-Ubaidy04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Buonafalce04,
  author       = {Augusto Buonafalce},
  title        = {Sir Samuel Morland's Machina Cyclologica Cryptographica},
  journal      = {Cryptologia},
  volume       = {28},
  number       = {3},
  pages        = {253--264},
  year         = {2004},
  url          = {https://doi.org/10.1080/0161-110491892917},
  doi          = {10.1080/0161-110491892917},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Buonafalce04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Bury04,
  author       = {Jan Bury},
  title        = {Polish Codebreaking during the Russo-Polish War of 1919-1920},
  journal      = {Cryptologia},
  volume       = {28},
  number       = {3},
  pages        = {193--203},
  year         = {2004},
  url          = {https://doi.org/10.1080/0161-110491892872},
  doi          = {10.1080/0161-110491892872},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Bury04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Cowan04,
  author       = {Michael J. Cowan},
  title        = {Rasterschl{\"{u}}Ssel 44 - the epitome of Hand Field Ciphers},
  journal      = {Cryptologia},
  volume       = {28},
  number       = {2},
  pages        = {115--148},
  year         = {2004},
  url          = {https://doi.org/10.1080/0161-110491892827},
  doi          = {10.1080/0161-110491892827},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Cowan04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Donovan04,
  author       = {Peter Donovan},
  title        = {The Flaw in the Jn25 Series of Ciphers},
  journal      = {Cryptologia},
  volume       = {28},
  number       = {4},
  pages        = {325--340},
  year         = {2004},
  url          = {https://doi.org/10.1080/0161-110491892962},
  doi          = {10.1080/0161-110491892962},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Donovan04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Driskell04,
  author       = {Lisa Driskell},
  title        = {Wavelet-Based Steganography},
  journal      = {Cryptologia},
  volume       = {28},
  number       = {2},
  pages        = {157--174},
  year         = {2004},
  url          = {https://doi.org/10.1080/0161-110491892854},
  doi          = {10.1080/0161-110491892854},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Driskell04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/ErskineM04,
  author       = {Ralph Erskine and
                  Philip Marks},
  title        = {Naval Enigma: Seahorse and Other Kriegsmarine Cipher Blunders},
  journal      = {Cryptologia},
  volume       = {28},
  number       = {3},
  pages        = {211--241},
  year         = {2004},
  url          = {https://doi.org/10.1080/0161-110491892890},
  doi          = {10.1080/0161-110491892890},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/ErskineM04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Fuensanta04,
  author       = {Jos{\'{e}} Ram{\'{o}}n Soler Fuensanta},
  title        = {Mechanical Cipher Systems in the Spanish Civil War},
  journal      = {Cryptologia},
  volume       = {28},
  number       = {3},
  pages        = {265--276},
  year         = {2004},
  url          = {https://doi.org/10.1080/0161-110491892926},
  doi          = {10.1080/0161-110491892926},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Fuensanta04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Gathen04,
  author       = {Joachim von zur Gathen},
  title        = {Friederich Johann buck: Arithmetic Puzzles in Cryptography},
  journal      = {Cryptologia},
  volume       = {28},
  number       = {4},
  pages        = {309--324},
  year         = {2004},
  url          = {https://doi.org/10.1080/0161-110491892953},
  doi          = {10.1080/0161-110491892953},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Gathen04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Holden04,
  author       = {Joshua Holden},
  title        = {A Comparison of Cryptography Courses},
  journal      = {Cryptologia},
  volume       = {28},
  number       = {2},
  pages        = {97--111},
  year         = {2004},
  url          = {https://doi.org/10.1080/0161-110491892809},
  doi          = {10.1080/0161-110491892809},
  timestamp    = {Mon, 05 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Holden04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kahn04,
  author       = {David Kahn},
  title        = {Charles J. Mendelsohn and Why {I} Envy Him},
  journal      = {Cryptologia},
  volume       = {28},
  number       = {1},
  pages        = {1--17},
  year         = {2004},
  url          = {https://doi.org/10.1080/0161-110491892737},
  doi          = {10.1080/0161-110491892737},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kahn04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kochanski04,
  author       = {Martin Kochanski},
  title        = {The Comedy of Commercial Encryption Software},
  journal      = {Cryptologia},
  volume       = {28},
  number       = {1},
  pages        = {50--54},
  year         = {2004},
  url          = {https://doi.org/10.1080/0161-110491892773},
  doi          = {10.1080/0161-110491892773},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kochanski04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Koss04,
  author       = {Mike Koss},
  title        = {The Paper Enigma Machine},
  journal      = {Cryptologia},
  volume       = {28},
  number       = {3},
  pages        = {204--210},
  year         = {2004},
  url          = {https://doi.org/10.1080/0161-110491892881},
  doi          = {10.1080/0161-110491892881},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Koss04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kruh04,
  author       = {Louis Kruh},
  title        = {Reviews and Things Cryptologic},
  journal      = {Cryptologia},
  volume       = {28},
  number       = {1},
  pages        = {60--95},
  year         = {2004},
  url          = {https://doi.org/10.1080/0161-110491892791},
  doi          = {10.1080/0161-110491892791},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kruh04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kruh04a,
  author       = {Louis Kruh},
  title        = {Unknown German World War {II} Cipher Device},
  journal      = {Cryptologia},
  volume       = {28},
  number       = {2},
  pages        = {112--114},
  year         = {2004},
  url          = {https://doi.org/10.1080/0161-110491892818},
  doi          = {10.1080/0161-110491892818},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kruh04a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kruh04b,
  author       = {Louis Kruh},
  title        = {Reviews and Things Cryptologic},
  journal      = {Cryptologia},
  volume       = {28},
  number       = {2},
  pages        = {175--190},
  year         = {2004},
  url          = {https://doi.org/10.1080/0161-110491892863},
  doi          = {10.1080/0161-110491892863},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kruh04b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kruh04c,
  author       = {Louis Kruh},
  title        = {Reviews and Things Cryptologic},
  journal      = {Cryptologia},
  volume       = {28},
  number       = {3},
  pages        = {242--252},
  year         = {2004},
  url          = {https://doi.org/10.1080/0161-110491892908},
  doi          = {10.1080/0161-110491892908},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kruh04c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kruh04d,
  author       = {Louis Kruh},
  title        = {Reviews and Things Cryptologic},
  journal      = {Cryptologia},
  volume       = {28},
  number       = {4},
  pages        = {373--379},
  year         = {2004},
  url          = {https://doi.org/10.1080/0161-110491892999},
  doi          = {10.1080/0161-110491892999},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kruh04d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Lawrence04,
  author       = {John Lawrence},
  title        = {The Versatility of Rejewski's Method: Solving for the Wiring of the
                  Second Rotor},
  journal      = {Cryptologia},
  volume       = {28},
  number       = {2},
  pages        = {149--152},
  year         = {2004},
  url          = {https://doi.org/10.1080/0161-110491892836},
  doi          = {10.1080/0161-110491892836},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Lawrence04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Niblo04,
  author       = {Graham Niblo},
  title        = {The University of Southampton National Cipher Challenge},
  journal      = {Cryptologia},
  volume       = {28},
  number       = {3},
  pages        = {277--286},
  year         = {2004},
  url          = {https://doi.org/10.1080/0161-110491892935},
  doi          = {10.1080/0161-110491892935},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Niblo04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Quirantes04,
  author       = {Arturo Quirantes},
  title        = {Model {Z:} a Numbers-only Enigma Version},
  journal      = {Cryptologia},
  volume       = {28},
  number       = {2},
  pages        = {153--156},
  year         = {2004},
  url          = {https://doi.org/10.1080/0161-110491892845},
  doi          = {10.1080/0161-110491892845},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Quirantes04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Richard04,
  author       = {Joseph E. Richard},
  title        = {The Breaking of the Japanese Army's Codes},
  journal      = {Cryptologia},
  volume       = {28},
  number       = {4},
  pages        = {289--308},
  year         = {2004},
  url          = {https://doi.org/10.1080/0161-110491892944},
  doi          = {10.1080/0161-110491892944},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Richard04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Rugg04,
  author       = {Gordon Rugg},
  title        = {An Elegant Hoax? {A} Possible Solution to the Voynich Manuscript},
  journal      = {Cryptologia},
  volume       = {28},
  number       = {1},
  pages        = {31--46},
  year         = {2004},
  url          = {https://doi.org/10.1080/0161-110491892755},
  doi          = {10.1080/0161-110491892755},
  timestamp    = {Thu, 28 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Rugg04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Savory04,
  author       = {Stuart E. Savory},
  title        = {Pocket Enigma: the Review},
  journal      = {Cryptologia},
  volume       = {28},
  number       = {1},
  pages        = {55--59},
  year         = {2004},
  url          = {https://doi.org/10.1080/0161-110491892782},
  doi          = {10.1080/0161-110491892782},
  timestamp    = {Wed, 01 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Savory04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Stehle04,
  author       = {Damien Stehl{\'{e}}},
  title        = {Breaking Littlewood's Cipher},
  journal      = {Cryptologia},
  volume       = {28},
  number       = {4},
  pages        = {341--357},
  year         = {2004},
  url          = {https://doi.org/10.1080/0161-110491892971},
  doi          = {10.1080/0161-110491892971},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Stehle04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Zetterstrom04,
  author       = {Urban Zetterstr{\"{o}}m},
  title        = {Swedish {SA} Teleprinter Cipher System},
  journal      = {Cryptologia},
  volume       = {28},
  number       = {1},
  pages        = {18--30},
  year         = {2004},
  url          = {https://doi.org/10.1080/0161-110491892746},
  doi          = {10.1080/0161-110491892746},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Zetterstrom04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Abeles03,
  author       = {Francine F. Abeles},
  title        = {The Memoria Technica Cipher},
  journal      = {Cryptologia},
  volume       = {27},
  number       = {3},
  pages        = {217--229},
  year         = {2003},
  url          = {https://doi.org/10.1080/0161-110391891892},
  doi          = {10.1080/0161-110391891892},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Abeles03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/AndersonM03,
  author       = {Bob Anderson and
                  George McGinnis},
  title        = {Naval Security Group Command Display},
  journal      = {Cryptologia},
  volume       = {27},
  number       = {4},
  pages        = {350--360},
  year         = {2003},
  url          = {https://doi.org/10.1080/0161-110391891955},
  doi          = {10.1080/0161-110391891955},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/AndersonM03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Buonafalce03,
  author       = {Augusto Buonafalce},
  title        = {From the Skytale to the Enigma: Book Review},
  journal      = {Cryptologia},
  volume       = {27},
  number       = {2},
  pages        = {132--134},
  year         = {2003},
  url          = {https://doi.org/10.1080/0161-110391891810},
  doi          = {10.1080/0161-110391891810},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Buonafalce03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Clarkson03,
  author       = {Dorothy Clarkson},
  title        = {Cypher Machines Maintenance and Restoration Spanning sixty Years},
  journal      = {Cryptologia},
  volume       = {27},
  number       = {3},
  pages        = {209--216},
  year         = {2003},
  url          = {https://doi.org/10.1080/0161-110391891883},
  doi          = {10.1080/0161-110391891883},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Clarkson03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/David03,
  author       = {James David},
  title        = {Soviet Secrets in the ether - Clandestine Radio Stations at the New
                  York and {SAN} Francisco Consulates in World War {II}},
  journal      = {Cryptologia},
  volume       = {27},
  number       = {2},
  pages        = {135--147},
  year         = {2003},
  url          = {https://doi.org/10.1080/0161-110391891829},
  doi          = {10.1080/0161-110391891829},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/David03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Erskine03,
  author       = {Ralph Erskine},
  title        = {From the Archives What the Sinkov Mission Brought to Bletchley Park},
  journal      = {Cryptologia},
  volume       = {27},
  number       = {2},
  pages        = {111--118},
  year         = {2003},
  url          = {https://doi.org/10.1080/0161-110391891793},
  doi          = {10.1080/0161-110391891793},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Erskine03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/ErskineF03,
  author       = {Ralph Erskine and
                  Peter Freeman},
  title        = {Brigadier John Tiltman: One of Britain's finest Cryptologists},
  journal      = {Cryptologia},
  volume       = {27},
  number       = {4},
  pages        = {289--318},
  year         = {2003},
  url          = {https://doi.org/10.1080/0161-110391891928},
  doi          = {10.1080/0161-110391891928},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/ErskineF03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/FabrisC03,
  author       = {Francesco Fabris and
                  Myron Curtis},
  title        = {A Nomenclator Used by propaganda fide during the Chinese rites Controversy},
  journal      = {Cryptologia},
  volume       = {27},
  number       = {4},
  pages        = {319--338},
  year         = {2003},
  url          = {https://doi.org/10.1080/0161-110391891937},
  doi          = {10.1080/0161-110391891937},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/FabrisC03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Faurholt03,
  author       = {Niels Faurholt},
  title        = {Urkryptografen ("the Clock Cryptograph")},
  journal      = {Cryptologia},
  volume       = {27},
  number       = {3},
  pages        = {206--208},
  year         = {2003},
  url          = {https://doi.org/10.1080/0161-110391891874},
  doi          = {10.1080/0161-110391891874},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Faurholt03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/FreemanSW03,
  author       = {Wes Freeman and
                  Geoff Sullivan and
                  Frode Weierud},
  title        = {Purple Revealed: Simulation and Computer-Aided Cryptanalysis of Angooki
                  Taipu {B}},
  journal      = {Cryptologia},
  volume       = {27},
  number       = {1},
  pages        = {1--43},
  year         = {2003},
  url          = {https://doi.org/10.1080/0161-110391891739},
  doi          = {10.1080/0161-110391891739},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/FreemanSW03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Gathen03,
  author       = {Joachim von zur Gathen},
  title        = {Claude Comiers: the First Arithmetical Cryptography},
  journal      = {Cryptologia},
  volume       = {27},
  number       = {4},
  pages        = {339--349},
  year         = {2003},
  url          = {https://doi.org/10.1080/0161-110391891946},
  doi          = {10.1080/0161-110391891946},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Gathen03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Gladwin03,
  author       = {Lee A. Gladwin},
  title        = {Alan M. Turing's Critique of Running Short Cribs on the {US} Navy
                  Bombe},
  journal      = {Cryptologia},
  volume       = {27},
  number       = {1},
  pages        = {50--54},
  year         = {2003},
  url          = {https://doi.org/10.1080/0161-110391891757},
  doi          = {10.1080/0161-110391891757},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Gladwin03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Hamer03,
  author       = {David H. Hamer},
  title        = {The Enigmas - and Other Recovered Artefacts - of {U-85}},
  journal      = {Cryptologia},
  volume       = {27},
  number       = {2},
  pages        = {97--110},
  year         = {2003},
  url          = {https://doi.org/10.1080/0161-110391891784},
  doi          = {10.1080/0161-110391891784},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Hamer03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Jacobsen03,
  author       = {Philip H. Jacobsen},
  title        = {Foreknowledge of {PEARL} Harbor? No!: the Story of the U. S. Navy's
                  Efforts on Jn-25b},
  journal      = {Cryptologia},
  volume       = {27},
  number       = {3},
  pages        = {193--205},
  year         = {2003},
  url          = {https://doi.org/10.1080/0161-110391891865},
  doi          = {10.1080/0161-110391891865},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Jacobsen03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kruh03,
  author       = {Louis Kruh},
  title        = {Reviews and Things Cryptologic},
  journal      = {Cryptologia},
  volume       = {27},
  number       = {1},
  pages        = {55--72},
  year         = {2003},
  url          = {https://doi.org/10.1080/0161-110391891766},
  doi          = {10.1080/0161-110391891766},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kruh03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kruh03a,
  author       = {Louis Kruh},
  title        = {Reviews and Things Cryptologic},
  journal      = {Cryptologia},
  volume       = {27},
  number       = {2},
  pages        = {182--191},
  year         = {2003},
  url          = {https://doi.org/10.1080/0161-110391891856},
  doi          = {10.1080/0161-110391891856},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kruh03a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kruh03b,
  author       = {Louis Kruh},
  title        = {Reviews and Things Cryptologic},
  journal      = {Cryptologia},
  volume       = {27},
  number       = {3},
  pages        = {230--232},
  year         = {2003},
  url          = {https://doi.org/10.1080/0161-110391891900},
  doi          = {10.1080/0161-110391891900},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kruh03b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kruh03c,
  author       = {Louis Kruh},
  title        = {Reviews and Things Cryptologic},
  journal      = {Cryptologia},
  volume       = {27},
  number       = {4},
  pages        = {375--378},
  year         = {2003},
  url          = {https://doi.org/10.1080/0161-110391891973},
  doi          = {10.1080/0161-110391891973},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kruh03c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kruh03d,
  author       = {Louis Kruh},
  title        = {The Shakespeare-Bacon Controversy Continues on the Stage},
  journal      = {Cryptologia},
  volume       = {27},
  number       = {4},
  pages        = {379--380},
  year         = {2003},
  url          = {https://doi.org/10.1080/0161-110391891982},
  doi          = {10.1080/0161-110391891982},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kruh03d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Leeuw03,
  author       = {Karl de Leeuw},
  title        = {The Dutch Invention of the Rotor Machine, 1915-1923},
  journal      = {Cryptologia},
  volume       = {27},
  number       = {1},
  pages        = {73--94},
  year         = {2003},
  url          = {https://doi.org/10.1080/0161-110391891775},
  doi          = {10.1080/0161-110391891775},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Leeuw03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/MusaSW03,
  author       = {Mohammad A. Musa and
                  Edward F. Schaefer and
                  Stephen Wedig},
  title        = {A Simplified {AES} Algorithm and its Linear and Differential Cryptanalyses},
  journal      = {Cryptologia},
  volume       = {27},
  number       = {2},
  pages        = {148--177},
  year         = {2003},
  url          = {https://doi.org/10.1080/0161-110391891838},
  doi          = {10.1080/0161-110391891838},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/MusaSW03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Phan03,
  author       = {Raphael Chung{-}Wei Phan},
  title        = {Impossible Differential Cryptanalysis of Mini-AES},
  journal      = {Cryptologia},
  volume       = {27},
  number       = {4},
  pages        = {361--374},
  year         = {2003},
  url          = {https://doi.org/10.1080/0161-110391891964},
  doi          = {10.1080/0161-110391891964},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Phan03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Ratcliff03,
  author       = {Rebecca A. Ratcliff},
  title        = {How Statistics {LED} the Germans to Believe Enigma Secure and Why
                  They Were Wrong: neglecting the Practical Mathematics of Cipher Machines},
  journal      = {Cryptologia},
  volume       = {27},
  number       = {2},
  pages        = {119--131},
  year         = {2003},
  url          = {https://doi.org/10.1080/0161-110391891801},
  doi          = {10.1080/0161-110391891801},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Ratcliff03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Sheldon03,
  author       = {Rose Mary Sheldon},
  title        = {The Sator Rebus: an Unsolved Cryptogram?},
  journal      = {Cryptologia},
  volume       = {27},
  number       = {3},
  pages        = {233--287},
  year         = {2003},
  url          = {https://doi.org/10.1080/0161-110391891919},
  doi          = {10.1080/0161-110391891919},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Sheldon03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Turing03,
  author       = {Alan M. Turing},
  title        = {Alan M. Turing's Critique of Running Short Cribs on the U. S. Navy
                  Bombe},
  journal      = {Cryptologia},
  volume       = {27},
  number       = {1},
  pages        = {44--49},
  year         = {2003},
  url          = {https://doi.org/10.1080/0161-110391891748},
  doi          = {10.1080/0161-110391891748},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Turing03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Winkel03,
  author       = {Brian J. Winkel},
  title        = {Extraordinary Cryptology Collection},
  journal      = {Cryptologia},
  volume       = {27},
  number       = {2},
  pages        = {180--181},
  year         = {2003},
  url          = {https://doi.org/10.1080/0161-110391891847},
  doi          = {10.1080/0161-110391891847},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Winkel03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/BauerT02,
  author       = {Craig Bauer and
                  Christian N. S. Tate},
  title        = {A Statistical Attack on the Running Key Cipher},
  journal      = {Cryptologia},
  volume       = {26},
  number       = {4},
  pages        = {274--282},
  year         = {2002},
  url          = {https://doi.org/10.1080/0161-110291890939},
  doi          = {10.1080/0161-110291890939},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/BauerT02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Beckman02,
  author       = {Bengt Beckman},
  title        = {An Early Cipher Device: Fredrik Gripenstierna's Machine},
  journal      = {Cryptologia},
  volume       = {26},
  number       = {2},
  pages        = {113--123},
  year         = {2002},
  url          = {https://doi.org/10.1080/0161-110291890821},
  doi          = {10.1080/0161-110291890821},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Beckman02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Clive02,
  author       = {Keith P. Clive},
  title        = {The Battle of the seals},
  journal      = {Cryptologia},
  volume       = {26},
  number       = {2},
  pages        = {103--112},
  year         = {2002},
  url          = {https://doi.org/10.1080/0161-110291890812},
  doi          = {10.1080/0161-110291890812},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Clive02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/GlunderW02,
  author       = {Georg Gl{\"{u}}nder and
                  Paul Whitaker},
  title        = {Wireless and "Geheimschreiber" Operator in the War, 1941 - 1945},
  journal      = {Cryptologia},
  volume       = {26},
  number       = {2},
  pages        = {81--96},
  year         = {2002},
  url          = {https://doi.org/10.1080/0161-110291890786},
  doi          = {10.1080/0161-110291890786},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/GlunderW02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/GnanaguruparanK02,
  author       = {Meenakshi Gnanaguruparan and
                  Subhash C. Kak},
  title        = {Recursive Hiding of Secrets in Visual Cryptography},
  journal      = {Cryptologia},
  volume       = {26},
  number       = {1},
  pages        = {68--76},
  year         = {2002},
  url          = {https://doi.org/10.1080/0161-110291890768},
  doi          = {10.1080/0161-110291890768},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/GnanaguruparanK02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Heys02,
  author       = {Howard M. Heys},
  title        = {A Tutorial on Linear and Differential Cryptanalysis},
  journal      = {Cryptologia},
  volume       = {26},
  number       = {3},
  pages        = {189--221},
  year         = {2002},
  url          = {https://doi.org/10.1080/0161-110291890885},
  doi          = {10.1080/0161-110291890885},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Heys02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kahn02,
  author       = {David Kahn},
  title        = {A Riverbank {TROVE}},
  journal      = {Cryptologia},
  volume       = {26},
  number       = {3},
  pages        = {161--164},
  year         = {2002},
  url          = {https://doi.org/10.1080/0161-110291890867},
  doi          = {10.1080/0161-110291890867},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kahn02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Koot02,
  author       = {H. Koot},
  title        = {Expert's Opinion on the Enigma Ciphering Machine},
  journal      = {Cryptologia},
  volume       = {26},
  number       = {2},
  pages        = {101--102},
  year         = {2002},
  url          = {https://doi.org/10.1080/0161-110291890803},
  doi          = {10.1080/0161-110291890803},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Koot02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kruh02,
  author       = {Louis Kruh},
  title        = {The World of Codes and Ciphers at the Heinz Nixdorf Museumsforum},
  journal      = {Cryptologia},
  volume       = {26},
  number       = {1},
  pages        = {59--67},
  year         = {2002},
  url          = {https://doi.org/10.1080/0161-110291890759},
  doi          = {10.1080/0161-110291890759},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kruh02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kruh02a,
  author       = {Louis Kruh},
  title        = {Reviews and Things Cryptologic},
  journal      = {Cryptologia},
  volume       = {26},
  number       = {1},
  pages        = {77--79},
  year         = {2002},
  url          = {https://doi.org/10.1080/0161-110291890777},
  doi          = {10.1080/0161-110291890777},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kruh02a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kruh02b,
  author       = {Louis Kruh},
  title        = {Reviews and Things Cryptologic},
  journal      = {Cryptologia},
  volume       = {26},
  number       = {2},
  pages        = {138--158},
  year         = {2002},
  url          = {https://doi.org/10.1080/0161-110291890858},
  doi          = {10.1080/0161-110291890858},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kruh02b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kruh02c,
  author       = {Louis Kruh},
  title        = {Reviews and Things Cryptologic},
  journal      = {Cryptologia},
  volume       = {26},
  number       = {3},
  pages        = {235--239},
  year         = {2002},
  url          = {https://doi.org/10.1080/0161-110291890902},
  doi          = {10.1080/0161-110291890902},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kruh02c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kruh02d,
  author       = {Louis Kruh},
  title        = {Reviews and Things Cryptologic},
  journal      = {Cryptologia},
  volume       = {26},
  number       = {4},
  pages        = {307--317},
  year         = {2002},
  url          = {https://doi.org/10.1080/0161-110291890957},
  doi          = {10.1080/0161-110291890957},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kruh02d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/KruhD02,
  author       = {Louis Kruh and
                  Cipher A. Deavours},
  title        = {The Commercial Enigma: Beginnings of Machine Cryptography},
  journal      = {Cryptologia},
  volume       = {26},
  number       = {1},
  pages        = {1--16},
  year         = {2002},
  url          = {https://doi.org/10.1080/0161-110291890731},
  doi          = {10.1080/0161-110291890731},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/KruhD02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Michie02,
  author       = {Donald Michie},
  title        = {Colossus and the Breaking of the Wartime "Fish" Codes},
  journal      = {Cryptologia},
  volume       = {26},
  number       = {1},
  pages        = {17--58},
  year         = {2002},
  url          = {https://doi.org/10.1080/0161-110291890740},
  doi          = {10.1080/0161-110291890740},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Michie02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Phan02,
  author       = {Raphael Chung{-}Wei Phan},
  title        = {Further Notes for a Self-Study Course in Block-Cipher Cryptanalysis},
  journal      = {Cryptologia},
  volume       = {26},
  number       = {2},
  pages        = {129--137},
  year         = {2002},
  url          = {https://doi.org/10.1080/0161-110291890849},
  doi          = {10.1080/0161-110291890849},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Phan02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Phan02a,
  author       = {Raphael Chung{-}Wei Phan},
  title        = {Mini Advanced Encryption Standard (Mini-AES): a Testbed for Cryptanalysis
                  Students},
  journal      = {Cryptologia},
  volume       = {26},
  number       = {4},
  pages        = {283--306},
  year         = {2002},
  url          = {https://doi.org/10.1080/0161-110291890948},
  doi          = {10.1080/0161-110291890948},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Phan02a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Stallings02,
  author       = {William Stallings},
  title        = {The Advanced Encryption Standard},
  journal      = {Cryptologia},
  volume       = {26},
  number       = {3},
  pages        = {165--188},
  year         = {2002},
  url          = {https://doi.org/10.1080/0161-110291890876},
  doi          = {10.1080/0161-110291890876},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Stallings02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Sullivan02,
  author       = {Geoff Sullivan},
  title        = {The {ECM} Mark {II:} Some Observations on the Rotor Stepping},
  journal      = {Cryptologia},
  volume       = {26},
  number       = {2},
  pages        = {97--100},
  year         = {2002},
  url          = {https://doi.org/10.1080/0161-110291890795},
  doi          = {10.1080/0161-110291890795},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Sullivan02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Sullivan02a,
  author       = {Geoff Sullivan},
  title        = {Cryptanalysis of Hagelin Machine Pin wheels},
  journal      = {Cryptologia},
  volume       = {26},
  number       = {4},
  pages        = {257--273},
  year         = {2002},
  url          = {https://doi.org/10.1080/0161-110291890920},
  doi          = {10.1080/0161-110291890920},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Sullivan02a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Wolfe02,
  author       = {Henry B. Wolfe},
  title        = {Non-Cryptanalytic Attacks},
  journal      = {Cryptologia},
  volume       = {26},
  number       = {3},
  pages        = {222--234},
  year         = {2002},
  url          = {https://doi.org/10.1080/0161-110291890894},
  doi          = {10.1080/0161-110291890894},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Wolfe02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Budiansky01,
  author       = {Stephen Budiansky},
  title        = {Codebreaking with {IBM} Machines in World War {II}},
  journal      = {Cryptologia},
  volume       = {25},
  number       = {4},
  pages        = {241--255},
  year         = {2001},
  url          = {https://doi.org/10.1080/0161-110191889914},
  doi          = {10.1080/0161-110191889914},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Budiansky01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Burke01,
  author       = {Colin B. Burke},
  title        = {Kim Philby, the American Intelligence Community, and {OP-20-G:} the
                  Fox Built the Hen-House and Took the Keys},
  journal      = {Cryptologia},
  volume       = {25},
  number       = {2},
  pages        = {88--90},
  year         = {2001},
  url          = {https://doi.org/10.1080/0161-110191889815},
  doi          = {10.1080/0161-110191889815},
  timestamp    = {Thu, 03 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Burke01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Gladwin01,
  author       = {Lee A. Gladwin},
  title        = {Alan Turing's Visit to Dayton},
  journal      = {Cryptologia},
  volume       = {25},
  number       = {1},
  pages        = {11--17},
  year         = {2001},
  url          = {https://doi.org/10.1080/0161-110191889743},
  doi          = {10.1080/0161-110191889743},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Gladwin01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Hammant01,
  author       = {Thomas R. Hammant},
  title        = {Russian and Soviet Cryptology {III} - Soviet Comint and the Civil
                  War, 1918-1921},
  journal      = {Cryptologia},
  volume       = {25},
  number       = {1},
  pages        = {50--60},
  year         = {2001},
  url          = {https://doi.org/10.1080/0161-110191889770},
  doi          = {10.1080/0161-110191889770},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Hammant01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Hammant01a,
  author       = {Thomas R. Hammant},
  title        = {Russian and Soviet Cryptology {IV} - Some Incidents in the 1930's},
  journal      = {Cryptologia},
  volume       = {25},
  number       = {1},
  pages        = {61--63},
  year         = {2001},
  url          = {https://doi.org/10.1080/0161-110191889789},
  doi          = {10.1080/0161-110191889789},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Hammant01a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Hernandez-Castro01,
  author       = {Julio C. Hernandez{-}Castro and
                  Arturo Ribagorda and
                  Pedro Isasi and
                  Jos{\'{e}} M. Sierra},
  title        = {Genetic Algorithms Can be Used to Obtain Good Linear Congruential
                  Generators},
  journal      = {Cryptologia},
  volume       = {25},
  number       = {3},
  pages        = {213--229},
  year         = {2001},
  url          = {https://doi.org/10.1080/0161-110191889897},
  doi          = {10.1080/0161-110191889897},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Hernandez-Castro01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Ibbotson01,
  author       = {Peter Ibbotson},
  title        = {Sayers and Ciphers},
  journal      = {Cryptologia},
  volume       = {25},
  number       = {2},
  pages        = {81--87},
  year         = {2001},
  url          = {https://doi.org/10.1080/0161-110191889806},
  doi          = {10.1080/0161-110191889806},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Ibbotson01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Johnsen01,
  author       = {Ben Johnsen},
  title        = {Cryptography in Runic inscriptions: a Remark on the Article, "Cryptography
                  in Runic inscriptions, " by O. G. Landsverk},
  journal      = {Cryptologia},
  volume       = {25},
  number       = {2},
  pages        = {95--100},
  year         = {2001},
  url          = {https://doi.org/10.1080/0161-110191889833},
  doi          = {10.1080/0161-110191889833},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Johnsen01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kruh01,
  author       = {Louis Kruh},
  title        = {Reviews and Things Cryptologic},
  journal      = {Cryptologia},
  volume       = {25},
  number       = {1},
  pages        = {64--79},
  year         = {2001},
  url          = {https://doi.org/10.1080/0161-110191889798},
  doi          = {10.1080/0161-110191889798},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kruh01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kruh01a,
  author       = {Louis Kruh},
  title        = {Reviews and Things Cryptologic},
  journal      = {Cryptologia},
  volume       = {25},
  number       = {2},
  pages        = {142--159},
  year         = {2001},
  url          = {https://doi.org/10.1080/0161-110191889851},
  doi          = {10.1080/0161-110191889851},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kruh01a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kruh01b,
  author       = {Louis Kruh},
  title        = {Reviews and Things Cryptologic},
  journal      = {Cryptologia},
  volume       = {25},
  number       = {3},
  pages        = {230--239},
  year         = {2001},
  url          = {https://doi.org/10.1080/0161-110191889905},
  doi          = {10.1080/0161-110191889905},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kruh01b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kruh01c,
  author       = {Louis Kruh},
  title        = {Reviews and Things Cryptologic},
  journal      = {Cryptologia},
  volume       = {25},
  number       = {4},
  pages        = {311--317},
  year         = {2001},
  url          = {https://doi.org/10.1080/0161-110191889950},
  doi          = {10.1080/0161-110191889950},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kruh01c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Landini01,
  author       = {Gabriel Landini},
  title        = {Evidence of Linguistic Structure in the Voynich Manuscript Using Spectral
                  Analysis},
  journal      = {Cryptologia},
  volume       = {25},
  number       = {4},
  pages        = {275--295},
  year         = {2001},
  url          = {https://doi.org/10.1080/0161-110191889932},
  doi          = {10.1080/0161-110191889932},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Landini01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Leeuw01,
  author       = {Karl de Leeuw},
  title        = {Johann Friedrich Euler {(1741-1800):} Mathematician and Cryptologist
                  at the Court of the Dutch Stadholder William {V}},
  journal      = {Cryptologia},
  volume       = {25},
  number       = {4},
  pages        = {256--274},
  year         = {2001},
  url          = {https://doi.org/10.1080/0161-110191889923},
  doi          = {10.1080/0161-110191889923},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Leeuw01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Marks01,
  author       = {Philip Marks},
  title        = {Umkehrwalze {D:} Enigma's Rewirable Reflector - Part {I}},
  journal      = {Cryptologia},
  volume       = {25},
  number       = {2},
  pages        = {101--141},
  year         = {2001},
  url          = {https://doi.org/10.1080/0161-110191889842},
  doi          = {10.1080/0161-110191889842},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Marks01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Marks01a,
  author       = {Philip C. Marks},
  title        = {Umkehrwalze {D:} Enigma's Rewirable Reflector - Part {II}},
  journal      = {Cryptologia},
  volume       = {25},
  number       = {3},
  pages        = {177--212},
  year         = {2001},
  url          = {https://doi.org/10.1080/0161-110191889888},
  doi          = {10.1080/0161-110191889888},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Marks01a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Marks01b,
  author       = {Philip C. Marks},
  title        = {Umkehrwalze {D:} Enigma's Rewirable Reflector - Part {III}},
  journal      = {Cryptologia},
  volume       = {25},
  number       = {4},
  pages        = {296--310},
  year         = {2001},
  url          = {https://doi.org/10.1080/0161-110191889941},
  doi          = {10.1080/0161-110191889941},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Marks01b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Risca01,
  author       = {Viviana I. Risca},
  title        = {DNA-Based Steganography},
  journal      = {Cryptologia},
  volume       = {25},
  number       = {1},
  pages        = {37--49},
  year         = {2001},
  url          = {https://doi.org/10.1080/0161-110191889761},
  doi          = {10.1080/0161-110191889761},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Risca01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Rubin01,
  author       = {Michael Rubin},
  title        = {The Telegraph, Espionage, and Cryptology in Nineteenth Century Iran},
  journal      = {Cryptologia},
  volume       = {25},
  number       = {1},
  pages        = {18--36},
  year         = {2001},
  url          = {https://doi.org/10.1080/0161-110191889752},
  doi          = {10.1080/0161-110191889752},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Rubin01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Turing01,
  author       = {Alan M. Turing},
  title        = {Visit to National Cash Register Corporation of Dayton, Ohio},
  journal      = {Cryptologia},
  volume       = {25},
  number       = {1},
  pages        = {1--10},
  year         = {2001},
  url          = {https://doi.org/10.1080/0161-110191889734},
  doi          = {10.1080/0161-110191889734},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Turing01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Winkler01,
  author       = {Jonathan Winkler},
  title        = {From the Archives Early Corporate espionage amid World War {I} Censorship},
  journal      = {Cryptologia},
  volume       = {25},
  number       = {2},
  pages        = {91--94},
  year         = {2001},
  url          = {https://doi.org/10.1080/0161-110191889824},
  doi          = {10.1080/0161-110191889824},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Winkler01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Atkinson00,
  author       = {Russell Atkinson},
  title        = {David Brian Kern Theft of Trade Secrets},
  journal      = {Cryptologia},
  volume       = {24},
  number       = {4},
  pages        = {361--369},
  year         = {2000},
  url          = {https://doi.org/10.1080/01611190008984254},
  doi          = {10.1080/01611190008984254},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Atkinson00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Budiansky00,
  author       = {Stephen Budiansky},
  title        = {Closing the Book on Pearl Harbor},
  journal      = {Cryptologia},
  volume       = {24},
  number       = {2},
  pages        = {119--130},
  year         = {2000},
  url          = {https://doi.org/10.1080/01611190008984236},
  doi          = {10.1080/01611190008984236},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Budiansky00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Burke00,
  author       = {Colin B. Burke},
  title        = {Letter to the Editor},
  journal      = {Cryptologia},
  volume       = {24},
  number       = {4},
  pages        = {351--352},
  year         = {2000},
  url          = {https://doi.org/10.1080/01611190008984252},
  doi          = {10.1080/01611190008984252},
  timestamp    = {Thu, 03 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Burke00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Davies00,
  author       = {Donald W. Davies},
  title        = {An Unidentified Cipher Device},
  journal      = {Cryptologia},
  volume       = {24},
  number       = {2},
  pages        = {131--134},
  year         = {2000},
  url          = {https://doi.org/10.1080/01611190008984237},
  doi          = {10.1080/01611190008984237},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Davies00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Erskine00,
  author       = {Ralph Erskine},
  title        = {What did the Sinkov Mission Receive from Bletchley Park?},
  journal      = {Cryptologia},
  volume       = {24},
  number       = {2},
  pages        = {97--109},
  year         = {2000},
  url          = {https://doi.org/10.1080/01611190008984234},
  doi          = {10.1080/01611190008984234},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Erskine00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Hamer00,
  author       = {David H. Hamer},
  title        = {{G-312:} An Abwehr Enigma},
  journal      = {Cryptologia},
  volume       = {24},
  number       = {1},
  pages        = {41--54},
  year         = {2000},
  url          = {https://doi.org/10.1080/0161-110091888772},
  doi          = {10.1080/0161-110091888772},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Hamer00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Hammant00,
  author       = {Thomas R. Hammant},
  title        = {Russian and Soviet Cryptology {I} - Some Communications Intelligence
                  in Tsarist Russia},
  journal      = {Cryptologia},
  volume       = {24},
  number       = {3},
  pages        = {235--249},
  year         = {2000},
  url          = {https://doi.org/10.1080/01611190008984244},
  doi          = {10.1080/01611190008984244},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Hammant00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Hammant00a,
  author       = {Thomas R. Hammant},
  title        = {Russian and Soviet Cryptology {II} - the Magdeburg Incident: the Russian
                  View},
  journal      = {Cryptologia},
  volume       = {24},
  number       = {4},
  pages        = {333--338},
  year         = {2000},
  url          = {https://doi.org/10.1080/01611190008984250},
  doi          = {10.1080/01611190008984250},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Hammant00a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Huffman00,
  author       = {Stephen Huffman},
  title        = {The Navajo Code Talkers: a Cryptologic and Linguistic Perspective},
  journal      = {Cryptologia},
  volume       = {24},
  number       = {4},
  pages        = {289--320},
  year         = {2000},
  url          = {https://doi.org/10.1080/01611190008984247},
  doi          = {10.1080/01611190008984247},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Huffman00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Jacobsen00,
  author       = {Philip H. Jacobsen},
  title        = {A Cryptologic Veteran's Analysis of "Day of Deceit" - a Book Review},
  journal      = {Cryptologia},
  volume       = {24},
  number       = {2},
  pages        = {110--118},
  year         = {2000},
  url          = {https://doi.org/10.1080/01611190008984235},
  doi          = {10.1080/01611190008984235},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Jacobsen00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/KnudsenR00,
  author       = {Lars R. Knudsen and
                  Vincent Rijmen},
  title        = {Ciphertext-only Attack on Akelarre},
  journal      = {Cryptologia},
  volume       = {24},
  number       = {2},
  pages        = {135--147},
  year         = {2000},
  url          = {https://doi.org/10.1080/01611190008984238},
  doi          = {10.1080/01611190008984238},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/KnudsenR00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kruh00,
  author       = {Louis Kruh},
  title        = {Reviews and Things Cryptologic},
  journal      = {Cryptologia},
  volume       = {24},
  number       = {1},
  pages        = {67--93},
  year         = {2000},
  url          = {https://doi.org/10.1080/0161-110091888790},
  doi          = {10.1080/0161-110091888790},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kruh00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kruh00a,
  author       = {Louis Kruh},
  title        = {Reviews and Things Cryptologic},
  journal      = {Cryptologia},
  volume       = {24},
  number       = {2},
  pages        = {168--189},
  year         = {2000},
  url          = {https://doi.org/10.1080/01611190008984241},
  doi          = {10.1080/01611190008984241},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kruh00a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kruh00b,
  author       = {Louis Kruh},
  title        = {Reviews and Things Cryptologic},
  journal      = {Cryptologia},
  volume       = {24},
  number       = {3},
  pages        = {269--286},
  year         = {2000},
  url          = {https://doi.org/10.1080/01611190008984246},
  doi          = {10.1080/01611190008984246},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kruh00b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kruh00c,
  author       = {Louis Kruh},
  title        = {Corrections},
  journal      = {Cryptologia},
  volume       = {24},
  number       = {4},
  pages        = {370},
  year         = {2000},
  url          = {https://doi.org/10.1080/01611190008984255},
  doi          = {10.1080/01611190008984255},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kruh00c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/LiHLT00,
  author       = {Chuan{-}Ming Li and
                  Tzonelih Hwang and
                  Narn{-}Yih Lee and
                  Juin{-}Jang Tsai},
  title        = {(T, {N)} Threshold-Multisignature Scheme and Generalized-Multisignature
                  Scheme Where suspected Forgery Implies Traceability of Adversarial
                  Shareholders},
  journal      = {Cryptologia},
  volume       = {24},
  number       = {3},
  pages        = {250--268},
  year         = {2000},
  url          = {https://doi.org/10.1080/01611190008984245},
  doi          = {10.1080/01611190008984245},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/LiHLT00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/MarksW00,
  author       = {Philip Marks and
                  Frode Weierud},
  title        = {Recovering the Wiring of Enigma's Umkehrwalze {A}},
  journal      = {Cryptologia},
  volume       = {24},
  number       = {1},
  pages        = {55--66},
  year         = {2000},
  url          = {https://doi.org/10.1080/0161-110091888781},
  doi          = {10.1080/0161-110091888781},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/MarksW00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/McKay00,
  author       = {Craig Graham McKay},
  title        = {From the Archives Japanese fears and the Ironies of Interception},
  journal      = {Cryptologia},
  volume       = {24},
  number       = {4},
  pages        = {321--323},
  year         = {2000},
  url          = {https://doi.org/10.1080/01611190008984248},
  doi          = {10.1080/01611190008984248},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/McKay00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Parker00,
  author       = {Frederick D. Parker},
  title        = {How {OP-20-G} got Rid of Joe Rochefort},
  journal      = {Cryptologia},
  volume       = {24},
  number       = {3},
  pages        = {212--234},
  year         = {2000},
  url          = {https://doi.org/10.1080/01611190008984243},
  doi          = {10.1080/01611190008984243},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Parker00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Pesic00,
  author       = {Peter Pesic},
  title        = {The Clue to the Labyrinth: Francis {BACON} and the Decryption of Nature},
  journal      = {Cryptologia},
  volume       = {24},
  number       = {3},
  pages        = {193--211},
  year         = {2000},
  url          = {https://doi.org/10.1080/01611190008984242},
  doi          = {10.1080/01611190008984242},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Pesic00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Phillips00,
  author       = {Cecil Phillips},
  title        = {The American Solution of a German One-Time-Pad Cryptographic System
                  {(G-OTP)}},
  journal      = {Cryptologia},
  volume       = {24},
  number       = {4},
  pages        = {324--332},
  year         = {2000},
  url          = {https://doi.org/10.1080/01611190008984249},
  doi          = {10.1080/01611190008984249},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Phillips00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Ratcliff00,
  author       = {Rebecca A. Ratcliff},
  title        = {Cryptology through the Centuries: NSA's 1999 History Symposium},
  journal      = {Cryptologia},
  volume       = {24},
  number       = {2},
  pages        = {160--167},
  year         = {2000},
  url          = {https://doi.org/10.1080/01611190008984240},
  doi          = {10.1080/01611190008984240},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Ratcliff00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Saeednia00,
  author       = {Shahrokh Saeednia},
  title        = {How to Make the Hill Cipher Secure},
  journal      = {Cryptologia},
  volume       = {24},
  number       = {4},
  pages        = {353--360},
  year         = {2000},
  url          = {https://doi.org/10.1080/01611190008984253},
  doi          = {10.1080/01611190008984253},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Saeednia00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/SawadaA00,
  author       = {Hideki Sawada and
                  Takahiro Abe},
  title        = {Groups and {RSA} Cryptosystems},
  journal      = {Cryptologia},
  volume       = {24},
  number       = {1},
  pages        = {34--40},
  year         = {2000},
  url          = {https://doi.org/10.1080/0161-110091888763},
  doi          = {10.1080/0161-110091888763},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/SawadaA00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Schindler00,
  author       = {John R. Schindler},
  title        = {A hopeless Struggle: Austro-Hungarian Cryptology during World War
                  {I}},
  journal      = {Cryptologia},
  volume       = {24},
  number       = {4},
  pages        = {339--350},
  year         = {2000},
  url          = {https://doi.org/10.1080/01611190008984251},
  doi          = {10.1080/01611190008984251},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Schindler00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Schneier00,
  author       = {Bruce Schneier},
  title        = {A Self-Study Course in Block-Cipher Cryptanalysis},
  journal      = {Cryptologia},
  volume       = {24},
  number       = {1},
  pages        = {18--33},
  year         = {2000},
  url          = {https://doi.org/10.1080/0161-110091888754},
  doi          = {10.1080/0161-110091888754},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Schneier00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/WangH00,
  author       = {Chih{-}Hung Wang and
                  Tzonelih Hwang},
  title        = {(T, {M)} Threshold and Generalized ID-Based Conference Key Distribution
                  System},
  journal      = {Cryptologia},
  volume       = {24},
  number       = {2},
  pages        = {148--159},
  year         = {2000},
  url          = {https://doi.org/10.1080/01611190008984239},
  doi          = {10.1080/01611190008984239},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/WangH00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Williams00,
  author       = {Heidi Williams},
  title        = {Applying Statistical Language Recognition Techniques in the Ciphertext-only
                  Cryptanalysis of Enigma},
  journal      = {Cryptologia},
  volume       = {24},
  number       = {1},
  pages        = {4--17},
  year         = {2000},
  url          = {https://doi.org/10.1080/0161-110091888745},
  doi          = {10.1080/0161-110091888745},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Williams00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Winkel00,
  author       = {Brian J. Winkel},
  title        = {Annual Greg Mellen Memorial Cryptology Scholarship Prize},
  journal      = {Cryptologia},
  volume       = {24},
  number       = {1},
  pages        = {1--3},
  year         = {2000},
  url          = {https://doi.org/10.1080/0161-110091888736},
  doi          = {10.1080/0161-110091888736},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Winkel00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Bauer99,
  author       = {Friedrich L. Bauer},
  title        = {An Error in the History of Rotor Encryption Devices},
  journal      = {Cryptologia},
  volume       = {23},
  number       = {3},
  pages        = {206--210},
  year         = {1999},
  url          = {https://doi.org/10.1080/0161-119991887847},
  doi          = {10.1080/0161-119991887847},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Bauer99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Budiansky99,
  author       = {Stephen Budiansky},
  title        = {A Tribute to Cecil Phillips-and Arlington Hall's "Meritocracy"},
  journal      = {Cryptologia},
  volume       = {23},
  number       = {2},
  pages        = {97--107},
  year         = {1999},
  url          = {https://doi.org/10.1080/0161-119991887784},
  doi          = {10.1080/0161-119991887784},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Budiansky99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Davies99,
  author       = {Donald W. Davies},
  title        = {The Bombe a Remarkable Logic Machine},
  journal      = {Cryptologia},
  volume       = {23},
  number       = {2},
  pages        = {108--138},
  year         = {1999},
  url          = {https://doi.org/10.1080/0161-119991887793},
  doi          = {10.1080/0161-119991887793},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Davies99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Davies99a,
  author       = {Donald W. Davies},
  title        = {Effectiveness of the Diagonal Board},
  journal      = {Cryptologia},
  volume       = {23},
  number       = {3},
  pages        = {229--239},
  year         = {1999},
  url          = {https://doi.org/10.1080/0161-119991887865},
  doi          = {10.1080/0161-119991887865},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Davies99a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Ellis99,
  author       = {James H. Ellis},
  title        = {The History of Non-Secret Encryption},
  journal      = {Cryptologia},
  volume       = {23},
  number       = {3},
  pages        = {267--273},
  year         = {1999},
  url          = {https://doi.org/10.1080/0161-119991887919},
  doi          = {10.1080/0161-119991887919},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Ellis99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Erskine99,
  author       = {Ralph Erskine},
  title        = {Kriegsmarine Short Signal Systems - and How Bletchley Park Exploited
                  Them},
  journal      = {Cryptologia},
  volume       = {23},
  number       = {1},
  pages        = {65--92},
  year         = {1999},
  url          = {https://doi.org/10.1080/0161-119991887775},
  doi          = {10.1080/0161-119991887775},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Erskine99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Greenough99,
  author       = {H. Paul Greenough},
  title        = {Cryptanalysis of the Hagelin {C-52} and Similar Machines a Known Plaintext
                  Attack},
  journal      = {Cryptologia},
  volume       = {23},
  number       = {2},
  pages        = {139--156},
  year         = {1999},
  url          = {https://doi.org/10.1080/0161-119991887801},
  doi          = {10.1080/0161-119991887801},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Greenough99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Hagerty99,
  author       = {Alexander Hagerty},
  title        = {An unpublished Yardley Manuscript},
  journal      = {Cryptologia},
  volume       = {23},
  number       = {4},
  pages        = {289--297},
  year         = {1999},
  url          = {https://doi.org/10.1080/0161-119991887946},
  doi          = {10.1080/0161-119991887946},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Hagerty99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kahn99,
  author       = {David Kahn},
  title        = {Students Better than a Pro (Bazeries) and an Author (Candela)},
  journal      = {Cryptologia},
  volume       = {23},
  number       = {1},
  pages        = {63--64},
  year         = {1999},
  url          = {https://doi.org/10.1080/0161-119991887766},
  doi          = {10.1080/0161-119991887766},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kahn99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kruh99,
  author       = {Louis Kruh},
  title        = {Reviews and Things Cryptologic},
  journal      = {Cryptologia},
  volume       = {23},
  number       = {1},
  pages        = {42--54},
  year         = {1999},
  url          = {https://doi.org/10.1080/0161-119991887748},
  doi          = {10.1080/0161-119991887748},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kruh99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kruh99a,
  author       = {Louis Kruh},
  title        = {Reviews and Things Cryptologic},
  journal      = {Cryptologia},
  volume       = {23},
  number       = {2},
  pages        = {171--188},
  year         = {1999},
  url          = {https://doi.org/10.1080/0161-119991887829},
  doi          = {10.1080/0161-119991887829},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kruh99a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kruh99b,
  author       = {Louis Kruh},
  title        = {Vint Hill Farms Station},
  journal      = {Cryptologia},
  volume       = {23},
  number       = {3},
  pages        = {259--260},
  year         = {1999},
  url          = {https://doi.org/10.1080/0161-119991887892},
  doi          = {10.1080/0161-119991887892},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kruh99b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kruh99c,
  author       = {Louis Kruh},
  title        = {Reviews and Things Cryptologic},
  journal      = {Cryptologia},
  volume       = {23},
  number       = {3},
  pages        = {274--286},
  year         = {1999},
  url          = {https://doi.org/10.1080/0161-119991887928},
  doi          = {10.1080/0161-119991887928},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kruh99c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kruh99d,
  author       = {Louis Kruh},
  title        = {Reviews and Things Cryptologic},
  journal      = {Cryptologia},
  volume       = {23},
  number       = {4},
  pages        = {343--352},
  year         = {1999},
  url          = {https://doi.org/10.1080/0161-119991887991},
  doi          = {10.1080/0161-119991887991},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kruh99d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Lomonaco99,
  author       = {Samuel J. Lomonaco},
  title        = {A Quick Glance at Quantum Cryptography},
  journal      = {Cryptologia},
  volume       = {23},
  number       = {1},
  pages        = {1--41},
  year         = {1999},
  url          = {https://doi.org/10.1080/0161-119991887739},
  doi          = {10.1080/0161-119991887739},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Lomonaco99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/McKay99,
  author       = {Craig Graham McKay},
  title        = {Swedish Cryptanalysis and the {SAGA} of Arne Beurling a Book Review},
  journal      = {Cryptologia},
  volume       = {23},
  number       = {3},
  pages        = {257--258},
  year         = {1999},
  url          = {https://doi.org/10.1080/0161-119991887883},
  doi          = {10.1080/0161-119991887883},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/McKay99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Mclean99,
  author       = {Ridley Mclean},
  title        = {Naval Communications},
  journal      = {Cryptologia},
  volume       = {23},
  number       = {4},
  pages        = {353--379},
  year         = {1999},
  url          = {https://doi.org/10.1080/0161-119991888008},
  doi          = {10.1080/0161-119991888008},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Mclean99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Meulen99,
  author       = {Michael van der Meulen},
  title        = {German Air Force Signal Intelligence 1956: a Museum of Comint and
                  {SIGINT}},
  journal      = {Cryptologia},
  volume       = {23},
  number       = {3},
  pages        = {240--256},
  year         = {1999},
  url          = {https://doi.org/10.1080/0161-119991887874},
  doi          = {10.1080/0161-119991887874},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Meulen99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Reeds99,
  author       = {Jim Reeds},
  title        = {Breakthrough in Renaissance Cryptography a Book Review},
  journal      = {Cryptologia},
  volume       = {23},
  number       = {1},
  pages        = {59--62},
  year         = {1999},
  url          = {https://doi.org/10.1080/0161-119991887757},
  doi          = {10.1080/0161-119991887757},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Reeds99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Roch99,
  author       = {Axel Roch},
  title        = {Biopolitics and Intuitive Algebra in the Mathematization of Cryptology?
                  {A} Review of Shannon's "a Mathematical Theory of Cryptography" from
                  1945},
  journal      = {Cryptologia},
  volume       = {23},
  number       = {3},
  pages        = {261--266},
  year         = {1999},
  url          = {https://doi.org/10.1080/0161-119991887900},
  doi          = {10.1080/0161-119991887900},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Roch99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/SavardP99,
  author       = {John J. G. Savard and
                  Richard Pekelney},
  title        = {The {ECM} Mark {II:} Design, History, and Cryptology},
  journal      = {Cryptologia},
  volume       = {23},
  number       = {3},
  pages        = {211--228},
  year         = {1999},
  url          = {https://doi.org/10.1080/0161-119991887856},
  doi          = {10.1080/0161-119991887856},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/SavardP99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Smith99,
  author       = {David M. Smith},
  title        = {The Use of Decrypted German Weather Reports in the Operations of the
                  Fifteenth Air Force over Europe},
  journal      = {Cryptologia},
  volume       = {23},
  number       = {4},
  pages        = {298--304},
  year         = {1999},
  url          = {https://doi.org/10.1080/0161-119991887955},
  doi          = {10.1080/0161-119991887955},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Smith99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/SullivanW99,
  author       = {Geoff Sullivan and
                  Frode Weierud},
  title        = {The Swiss {NEMA} Cipher Machine},
  journal      = {Cryptologia},
  volume       = {23},
  number       = {4},
  pages        = {310--328},
  year         = {1999},
  url          = {https://doi.org/10.1080/0161-119991887973},
  doi          = {10.1080/0161-119991887973},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/SullivanW99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Ulbricht99,
  author       = {Heinz Ulbricht},
  title        = {Enigma-Uhr},
  journal      = {Cryptologia},
  volume       = {23},
  number       = {3},
  pages        = {193--205},
  year         = {1999},
  url          = {https://doi.org/10.1080/0161-119991887838},
  doi          = {10.1080/0161-119991887838},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Ulbricht99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/WalkerW99,
  author       = {Stephen T. Walker and
                  Joan D. Winston},
  title        = {Cryptography Policy Update},
  journal      = {Cryptologia},
  volume       = {23},
  number       = {2},
  pages        = {157--163},
  year         = {1999},
  url          = {https://doi.org/10.1080/0161-119991887810},
  doi          = {10.1080/0161-119991887810},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/WalkerW99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/WalkerW99a,
  author       = {Stephen T. Walker and
                  Joan D. Winston},
  title        = {Cryptography Policy Update},
  journal      = {Cryptologia},
  volume       = {23},
  number       = {4},
  pages        = {329--342},
  year         = {1999},
  url          = {https://doi.org/10.1080/0161-119991887982},
  doi          = {10.1080/0161-119991887982},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/WalkerW99a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Williams99,
  author       = {Robert L. Williams},
  title        = {A Note on the Voynich Manuscript},
  journal      = {Cryptologia},
  volume       = {23},
  number       = {4},
  pages        = {305--309},
  year         = {1999},
  url          = {https://doi.org/10.1080/0161-119991887964},
  doi          = {10.1080/0161-119991887964},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Williams99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Burke98,
  author       = {Colin B. Burke},
  title        = {A Gracious but Tragic Special Ultra Message},
  journal      = {Cryptologia},
  volume       = {22},
  number       = {1},
  pages        = {29--32},
  year         = {1998},
  url          = {https://doi.org/10.1080/0161-119891886759},
  doi          = {10.1080/0161-119891886759},
  timestamp    = {Thu, 03 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Burke98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Coppersmith98,
  author       = {Don Coppersmith},
  title        = {Attacking Four-Round Luby-Rackoff Ciphers},
  journal      = {Cryptologia},
  volume       = {22},
  number       = {3},
  pages        = {266--278},
  year         = {1998},
  url          = {https://doi.org/10.1080/0161-119891886920},
  doi          = {10.1080/0161-119891886920},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Coppersmith98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Ernst98,
  author       = {Thomas Ernst},
  title        = {The Numerical-Astrological Ciphers in the Third Book of Trithemius's
                  Steganographia},
  journal      = {Cryptologia},
  volume       = {22},
  number       = {4},
  pages        = {318--341},
  year         = {1998},
  url          = {https://doi.org/10.1080/0161-119891886957},
  doi          = {10.1080/0161-119891886957},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Ernst98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Hamer98,
  author       = {David Hamer},
  title        = {Letter to the Editors {M2114:} a Naval Enigma},
  journal      = {Cryptologia},
  volume       = {22},
  number       = {3},
  pages        = {230},
  year         = {1998},
  url          = {https://doi.org/10.1080/01611199809350311},
  doi          = {10.1080/01611199809350311},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Hamer98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/HamerSW98,
  author       = {David H. Hamer and
                  Geoff Sullivan and
                  Frode Weierud},
  title        = {Enigma Variations: an Extended Family of Machines},
  journal      = {Cryptologia},
  volume       = {22},
  number       = {3},
  pages        = {211--229},
  year         = {1998},
  url          = {https://doi.org/10.1080/0161-119891886885},
  doi          = {10.1080/0161-119891886885},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/HamerSW98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Heider98,
  author       = {Franz{-}Peter Heider},
  title        = {A Colossal Fish},
  journal      = {Cryptologia},
  volume       = {22},
  number       = {1},
  pages        = {69--95},
  year         = {1998},
  url          = {https://doi.org/10.1080/0161-119891886795},
  doi          = {10.1080/0161-119891886795},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Heider98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kahn98,
  author       = {David Kahn},
  title        = {Soviet Comint in the Cold War},
  journal      = {Cryptologia},
  volume       = {22},
  number       = {1},
  pages        = {1--24},
  year         = {1998},
  url          = {https://doi.org/10.1080/0161-119891886731},
  doi          = {10.1080/0161-119891886731},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kahn98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kelly98,
  author       = {Thomas Kelly},
  title        = {The Myth of the Skytale},
  journal      = {Cryptologia},
  volume       = {22},
  number       = {3},
  pages        = {244--260},
  year         = {1998},
  url          = {https://doi.org/10.1080/0161-119891886902},
  doi          = {10.1080/0161-119891886902},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kelly98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/KourtisM98,
  author       = {Anastasios Kourtis and
                  Charalampos Mantakas},
  title        = {Statistical Distribution of Delta Modulated Speech Signals as a Means
                  for Cryptanalysis in Voice Encryption Systems},
  journal      = {Cryptologia},
  volume       = {22},
  number       = {3},
  pages        = {279--287},
  year         = {1998},
  url          = {https://doi.org/10.1080/0161-119891886939},
  doi          = {10.1080/0161-119891886939},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/KourtisM98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kruh98,
  author       = {Louis Kruh},
  title        = {Reviews and Things Cryptologic},
  journal      = {Cryptologia},
  volume       = {22},
  number       = {1},
  pages        = {49--55},
  year         = {1998},
  url          = {https://doi.org/10.1080/0161-119891886777},
  doi          = {10.1080/0161-119891886777},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kruh98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kruh98a,
  author       = {Louis Kruh},
  title        = {Still Waiting to be Solved: Elgar's 1897 Cipher Message},
  journal      = {Cryptologia},
  volume       = {22},
  number       = {2},
  pages        = {97--98},
  year         = {1998},
  url          = {https://doi.org/10.1080/0161-119891886803},
  doi          = {10.1080/0161-119891886803},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kruh98a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kruh98b,
  author       = {Louis Kruh},
  title        = {Reviews and Things Cryptologic},
  journal      = {Cryptologia},
  volume       = {22},
  number       = {2},
  pages        = {167--191},
  year         = {1998},
  url          = {https://doi.org/10.1080/0161-119891886867},
  doi          = {10.1080/0161-119891886867},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kruh98b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kruh98c,
  author       = {Louis Kruh},
  title        = {Reviews and Things Cryptologic},
  journal      = {Cryptologia},
  volume       = {22},
  number       = {3},
  pages        = {261--265},
  year         = {1998},
  url          = {https://doi.org/10.1080/0161-119891886911},
  doi          = {10.1080/0161-119891886911},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kruh98c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kruh98d,
  author       = {Louis Kruh},
  title        = {Another Herbert O. Yardley Mystery?},
  journal      = {Cryptologia},
  volume       = {22},
  number       = {4},
  pages        = {370--375},
  year         = {1998},
  url          = {https://doi.org/10.1080/0161-119891886984},
  doi          = {10.1080/0161-119891886984},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kruh98d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kruh98e,
  author       = {Louis Kruh},
  title        = {Reviews and Things Cryptologic},
  journal      = {Cryptologia},
  volume       = {22},
  number       = {4},
  pages        = {376--379},
  year         = {1998},
  url          = {https://doi.org/10.1080/0161-119891886993},
  doi          = {10.1080/0161-119891886993},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kruh98e.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Lewis98,
  author       = {Graydon A. Lewis},
  title        = {Setting the Record Straight on Midway},
  journal      = {Cryptologia},
  volume       = {22},
  number       = {2},
  pages        = {99--101},
  year         = {1998},
  url          = {https://doi.org/10.1080/0161-119891886812},
  doi          = {10.1080/0161-119891886812},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Lewis98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/MendelsonWW98,
  author       = {Kenneth A. Mendelson and
                  Stephen T. Walker and
                  Joan D. Winston},
  title        = {The Evolution of Recent Cryptographic Policy in the United States},
  journal      = {Cryptologia},
  volume       = {22},
  number       = {3},
  pages        = {193--210},
  year         = {1998},
  url          = {https://doi.org/10.1080/0161-119891886876},
  doi          = {10.1080/0161-119891886876},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/MendelsonWW98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Meulen98,
  author       = {Michael van der Meulen},
  title        = {A First German Cryptologic Exhibition},
  journal      = {Cryptologia},
  volume       = {22},
  number       = {1},
  pages        = {33--48},
  year         = {1998},
  url          = {https://doi.org/10.1080/0161-119891886768},
  doi          = {10.1080/0161-119891886768},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Meulen98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Meulen98a,
  author       = {Michael van der Meulen},
  title        = {The Road to German Diplomatic Ciphers - 1919 {TO} 1945},
  journal      = {Cryptologia},
  volume       = {22},
  number       = {2},
  pages        = {141--166},
  year         = {1998},
  url          = {https://doi.org/10.1080/0161-119891886858},
  doi          = {10.1080/0161-119891886858},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Meulen98a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/MoldovyanM98,
  author       = {Alexander A. Moldovyan and
                  Nikolay A. Moldovyan},
  title        = {Software Encryption Algorithms for Transparent Protection Technology},
  journal      = {Cryptologia},
  volume       = {22},
  number       = {1},
  pages        = {56--68},
  year         = {1998},
  url          = {https://doi.org/10.1080/0161-119891886786},
  doi          = {10.1080/0161-119891886786},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/MoldovyanM98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/MoldovyanM98a,
  author       = {Alexander A. Moldovyan and
                  Nikolay A. Moldovyan},
  title        = {Flexible Block Cipher with Provably Inequivalent Cryptalgorithm Modifications},
  journal      = {Cryptologia},
  volume       = {22},
  number       = {2},
  pages        = {134--140},
  year         = {1998},
  url          = {https://doi.org/10.1080/0161-119891886849},
  doi          = {10.1080/0161-119891886849},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/MoldovyanM98a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Nichols98,
  author       = {Randall K. Nichols},
  title        = {The Bible Code},
  journal      = {Cryptologia},
  volume       = {22},
  number       = {2},
  pages        = {121--133},
  year         = {1998},
  url          = {https://doi.org/10.1080/0161-119891886830},
  doi          = {10.1080/0161-119891886830},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Nichols98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Oye98,
  author       = {David Schimmelpenninck van der Oye},
  title        = {Tsarist Codebreaking Some Background and Some Examples},
  journal      = {Cryptologia},
  volume       = {22},
  number       = {4},
  pages        = {342--353},
  year         = {1998},
  url          = {https://doi.org/10.1080/0161-119891886966},
  doi          = {10.1080/0161-119891886966},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Oye98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Pfeiffer98,
  author       = {Paul N. Pfeiffer},
  title        = {Breaking the German Weather Ciphers in the Mediterranean Detachment
                  G, 849th Signal Intelligence Service},
  journal      = {Cryptologia},
  volume       = {22},
  number       = {4},
  pages        = {354--369},
  year         = {1998},
  url          = {https://doi.org/10.1080/0161-119891886975},
  doi          = {10.1080/0161-119891886975},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Pfeiffer98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Reeds98,
  author       = {Jim Reeds},
  title        = {Solved: the Ciphers in Book {III} of Trithemius's Steganographia},
  journal      = {Cryptologia},
  volume       = {22},
  number       = {4},
  pages        = {291--317},
  year         = {1998},
  url          = {https://doi.org/10.1080/0161-119891886948},
  doi          = {10.1080/0161-119891886948},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Reeds98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Viterbo98,
  author       = {Emanuele Viterbo},
  title        = {The Ciphered autobiography of a 19th Century Egyptologist},
  journal      = {Cryptologia},
  volume       = {22},
  number       = {3},
  pages        = {231--243},
  year         = {1998},
  url          = {https://doi.org/10.1080/0161-119891886894},
  doi          = {10.1080/0161-119891886894},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Viterbo98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Weierud98,
  author       = {Frode Weierud},
  title        = {Sweden Cryptographic Superpower a Book Review},
  journal      = {Cryptologia},
  volume       = {22},
  number       = {1},
  pages        = {25--28},
  year         = {1998},
  url          = {https://doi.org/10.1080/0161-119891886740},
  doi          = {10.1080/0161-119891886740},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Weierud98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/CainS97,
  author       = {Thomas R. Cain and
                  Alan T. Sherman},
  title        = {How to Break Gifford's Cipher},
  journal      = {Cryptologia},
  volume       = {21},
  number       = {3},
  pages        = {237--286},
  year         = {1997},
  url          = {https://doi.org/10.1080/0161-119791885931},
  doi          = {10.1080/0161-119791885931},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/CainS97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/ChangJK97,
  author       = {Chin{-}Chen Chang and
                  Jinn{-}Ke Jan and
                  Huey{-}Cheue Kowng},
  title        = {A Digital Signature Scheme Based upon the Theory of Quadratic residues},
  journal      = {Cryptologia},
  volume       = {21},
  number       = {1},
  pages        = {55--70},
  year         = {1997},
  url          = {https://doi.org/10.1080/0161-119791885797},
  doi          = {10.1080/0161-119791885797},
  timestamp    = {Tue, 23 Jan 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/ChangJK97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/ChauL97,
  author       = {Hoi Fung Chau and
                  Hoi{-}Kwong Lo},
  title        = {One-Way Functions in Reversible Computations},
  journal      = {Cryptologia},
  volume       = {21},
  number       = {2},
  pages        = {139--148},
  year         = {1997},
  url          = {https://doi.org/10.1080/0161-119791885869},
  doi          = {10.1080/0161-119791885869},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/ChauL97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/ClarkD97,
  author       = {Andrew J. Clark and
                  Ed Dawson},
  title        = {A Parallel Genetic Algorithm for Cryptanalysis of the Polyalphabetic
                  Substitution Cipher},
  journal      = {Cryptologia},
  volume       = {21},
  number       = {2},
  pages        = {129--138},
  year         = {1997},
  url          = {https://doi.org/10.1080/0161-119791885850},
  doi          = {10.1080/0161-119791885850},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/ClarkD97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Comstock97,
  author       = {I. W. Comstock},
  title        = {Radio Intelligence and Security},
  journal      = {Cryptologia},
  volume       = {21},
  number       = {4},
  pages        = {368--377},
  year         = {1997},
  url          = {https://doi.org/10.1080/0161-119791886002},
  doi          = {10.1080/0161-119791886002},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Comstock97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Constance97,
  author       = {Paul Constance},
  title        = {How Jim Bamford probed the {NSA}},
  journal      = {Cryptologia},
  volume       = {21},
  number       = {1},
  pages        = {71--74},
  year         = {1997},
  url          = {https://doi.org/10.1080/0161-119791885805},
  doi          = {10.1080/0161-119791885805},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Constance97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Deavours97,
  author       = {Cipher A. Deavours},
  title        = {Lobsters, Crabs, and the Abwehr Enigma},
  journal      = {Cryptologia},
  volume       = {21},
  number       = {3},
  pages        = {193--199},
  year         = {1997},
  url          = {https://doi.org/10.1080/0161-119791885904},
  doi          = {10.1080/0161-119791885904},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Deavours97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Erskine97,
  author       = {Ralph Erskine},
  title        = {The First Naval Enigma Decrypts of World War {II}},
  journal      = {Cryptologia},
  volume       = {21},
  number       = {1},
  pages        = {42--46},
  year         = {1997},
  url          = {https://doi.org/10.1080/0161-119791885760},
  doi          = {10.1080/0161-119791885760},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Erskine97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Foster97,
  author       = {Caxton C. Foster},
  title        = {Drawbacks of the One-Time Pad},
  journal      = {Cryptologia},
  volume       = {21},
  number       = {4},
  pages        = {350--352},
  year         = {1997},
  url          = {https://doi.org/10.1080/0161-119791885986},
  doi          = {10.1080/0161-119791885986},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Foster97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Greenough97,
  author       = {H. Paul Greenough},
  title        = {Cryptanalysis of the Swedish {HC-9} a Known-Plaintext Approach},
  journal      = {Cryptologia},
  volume       = {21},
  number       = {4},
  pages        = {353--367},
  year         = {1997},
  url          = {https://doi.org/10.1080/0161-119791885995},
  doi          = {10.1080/0161-119791885995},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Greenough97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Guy97,
  author       = {Jacques B. M. Guy},
  title        = {The Distribution of Signs {C} and {O} in the Voynich Manuscript: Evidence
                  for a Real Language?},
  journal      = {Cryptologia},
  volume       = {21},
  number       = {1},
  pages        = {51--54},
  year         = {1997},
  url          = {https://doi.org/10.1080/0161-119791885788},
  doi          = {10.1080/0161-119791885788},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Guy97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Hamer97,
  author       = {David H. Hamer},
  title        = {Enigma: Actions involved in the 'Double Stepping' of the Middle Rotor},
  journal      = {Cryptologia},
  volume       = {21},
  number       = {1},
  pages        = {47--50},
  year         = {1997},
  url          = {https://doi.org/10.1080/0161-119791885779},
  doi          = {10.1080/0161-119791885779},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Hamer97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kahn97,
  author       = {David Kahn},
  title        = {British Economic espionage},
  journal      = {Cryptologia},
  volume       = {21},
  number       = {2},
  pages        = {158--164},
  year         = {1997},
  url          = {https://doi.org/10.1080/0161-119791885887},
  doi          = {10.1080/0161-119791885887},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kahn97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kelley97,
  author       = {Stephen J. Kelley},
  title        = {The Sigcum Story: Cryptographic Failure, Cryptologic Success},
  journal      = {Cryptologia},
  volume       = {21},
  number       = {4},
  pages        = {289--316},
  year         = {1997},
  url          = {https://doi.org/10.1080/0161-119791885940},
  doi          = {10.1080/0161-119791885940},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kelley97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Koblitz97,
  author       = {Neal Koblitz},
  title        = {Cryptography as a Teaching Tool},
  journal      = {Cryptologia},
  volume       = {21},
  number       = {4},
  pages        = {317--326},
  year         = {1997},
  url          = {https://doi.org/10.1080/0161-119791885959},
  doi          = {10.1080/0161-119791885959},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Koblitz97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kruh97,
  author       = {Louis Kruh},
  title        = {Reviews and Things Cryptologic},
  journal      = {Cryptologia},
  volume       = {21},
  number       = {1},
  pages        = {75--92},
  year         = {1997},
  url          = {https://doi.org/10.1080/0161-119791885814},
  doi          = {10.1080/0161-119791885814},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kruh97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kruh97a,
  author       = {Louis Kruh},
  title        = {Reviews and Things Cryptologic},
  journal      = {Cryptologia},
  volume       = {21},
  number       = {2},
  pages        = {110--128},
  year         = {1997},
  url          = {https://doi.org/10.1080/0161-119791885841},
  doi          = {10.1080/0161-119791885841},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kruh97a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kruh97b,
  author       = {Louis Kruh},
  title        = {Reviews and Things Cryptologic},
  journal      = {Cryptologia},
  volume       = {21},
  number       = {3},
  pages        = {218--236},
  year         = {1997},
  url          = {https://doi.org/10.1080/0161-119791885922},
  doi          = {10.1080/0161-119791885922},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kruh97b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kruh97c,
  author       = {Louis Kruh},
  title        = {Reviews and Things Cryptologic},
  journal      = {Cryptologia},
  volume       = {21},
  number       = {4},
  pages        = {335--349},
  year         = {1997},
  url          = {https://doi.org/10.1080/0161-119791885977},
  doi          = {10.1080/0161-119791885977},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kruh97c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/LeeH97,
  author       = {Nara{-}Yih Lee and
                  Tzonelih Hwang},
  title        = {On the Security of Park et al.'s Key Distribution Protocol for Digital
                  Mobile Communications},
  journal      = {Cryptologia},
  volume       = {21},
  number       = {4},
  pages        = {327--334},
  year         = {1997},
  url          = {https://doi.org/10.1080/0161-119791885968},
  doi          = {10.1080/0161-119791885968},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/LeeH97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Meulen97,
  author       = {Michael van der Meulen},
  title        = {Bundeswehrtarnverfahren},
  journal      = {Cryptologia},
  volume       = {21},
  number       = {3},
  pages        = {200--217},
  year         = {1997},
  url          = {https://doi.org/10.1080/0161-119791885913},
  doi          = {10.1080/0161-119791885913},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Meulen97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Oye97,
  author       = {David Schimmelpenninck van der Oye},
  title        = {A First Look at Russia's Codebreakers a Book Review},
  journal      = {Cryptologia},
  volume       = {21},
  number       = {1},
  pages        = {39--41},
  year         = {1997},
  url          = {https://doi.org/10.1080/0161-119791885751},
  doi          = {10.1080/0161-119791885751},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Oye97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Pesic97,
  author       = {Peter Pesic},
  title        = {Fran{\c{c}}ois Vi{\`{e}}te, Father of Modern Cryptanalysis - Two New
                  Manuscripts},
  journal      = {Cryptologia},
  volume       = {21},
  number       = {1},
  pages        = {1--29},
  year         = {1997},
  url          = {https://doi.org/10.1080/0161-119791885733},
  doi          = {10.1080/0161-119791885733},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Pesic97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Rubin97,
  author       = {Aviel D. Rubin},
  title        = {An Experience Teaching a Graduate Course in Cryptography},
  journal      = {Cryptologia},
  volume       = {21},
  number       = {2},
  pages        = {97--109},
  year         = {1997},
  url          = {https://doi.org/10.1080/0161-119791885832},
  doi          = {10.1080/0161-119791885832},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Rubin97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Sassoon97,
  author       = {George Sassoon},
  title        = {British Company Makes {PGP} Easier to Use},
  journal      = {Cryptologia},
  volume       = {21},
  number       = {1},
  pages        = {93--94},
  year         = {1997},
  url          = {https://doi.org/10.1080/0161-119791885823},
  doi          = {10.1080/0161-119791885823},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Sassoon97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Scott97,
  author       = {Norman Scott},
  title        = {Solving Japanese Naval Ciphers 1943-45},
  journal      = {Cryptologia},
  volume       = {21},
  number       = {2},
  pages        = {149--157},
  year         = {1997},
  url          = {https://doi.org/10.1080/0161-119791885878},
  doi          = {10.1080/0161-119791885878},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Scott97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Sims97,
  author       = {John Cary Sims},
  title        = {The Brusa Agreement of May 17, 1943},
  journal      = {Cryptologia},
  volume       = {21},
  number       = {1},
  pages        = {30--38},
  year         = {1997},
  url          = {https://doi.org/10.1080/0161-119791885742},
  doi          = {10.1080/0161-119791885742},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Sims97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Alvarez96,
  author       = {David {\'{A}}lvarez},
  title        = {Italian Diplomatic Cryptanalysis in World War {I}},
  journal      = {Cryptologia},
  volume       = {20},
  number       = {1},
  pages        = {1--10},
  year         = {1996},
  url          = {https://doi.org/10.1080/0161-119691884735},
  doi          = {10.1080/0161-119691884735},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Alvarez96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Alvarez96a,
  author       = {David {\'{A}}lvarez},
  title        = {Faded Lustre: Vatican Cryptography, 1815-1920},
  journal      = {Cryptologia},
  volume       = {20},
  number       = {2},
  pages        = {97--131},
  year         = {1996},
  url          = {https://doi.org/10.1080/0161-119691884825},
  doi          = {10.1080/0161-119691884825},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Alvarez96a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Bauer96,
  author       = {Friedrich L. Bauer},
  title        = {Cryptological Devices and Machines in the Deutsches Museum, Munich},
  journal      = {Cryptologia},
  volume       = {20},
  number       = {1},
  pages        = {11--13},
  year         = {1996},
  url          = {https://doi.org/10.1080/0161-119691884744},
  doi          = {10.1080/0161-119691884744},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Bauer96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Buonafalce96,
  author       = {Augusto Buonafalce},
  title        = {The Alberti Exhibition},
  journal      = {Cryptologia},
  volume       = {20},
  number       = {2},
  pages        = {132--134},
  year         = {1996},
  url          = {https://doi.org/10.1080/0161-119691884834},
  doi          = {10.1080/0161-119691884834},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Buonafalce96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/ClarkDB96,
  author       = {Andrew J. Clark and
                  Ed Dawson and
                  Helen Bergen},
  title        = {Combinatorial Optimization and the Knapsack Cipher},
  journal      = {Cryptologia},
  volume       = {20},
  number       = {1},
  pages        = {85--93},
  year         = {1996},
  url          = {https://doi.org/10.1080/0161-119691884807},
  doi          = {10.1080/0161-119691884807},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/ClarkDB96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Currier96,
  author       = {Prescott Currier},
  title        = {My "Purple" Trip to England in 1941},
  journal      = {Cryptologia},
  volume       = {20},
  number       = {3},
  pages        = {193--201},
  year         = {1996},
  url          = {https://doi.org/10.1080/0161-119691884906},
  doi          = {10.1080/0161-119691884906},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Currier96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/David96,
  author       = {Charles David},
  title        = {A World War {II} German Army Field Cipher and How We Broke {IT}},
  journal      = {Cryptologia},
  volume       = {20},
  number       = {1},
  pages        = {55--76},
  year         = {1996},
  url          = {https://doi.org/10.1080/0161-119691884780},
  doi          = {10.1080/0161-119691884780},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/David96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/DawsonN96,
  author       = {Ed Dawson and
                  Lauren Nielsen},
  title        = {Automated Cryptanalysis of {XOR} Plaintext Strings},
  journal      = {Cryptologia},
  volume       = {20},
  number       = {2},
  pages        = {165--181},
  year         = {1996},
  url          = {https://doi.org/10.1080/0161-119691884870},
  doi          = {10.1080/0161-119691884870},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/DawsonN96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Erskine96,
  author       = {Ralph Erskine},
  title        = {Kriegsmarine Signal Indicators},
  journal      = {Cryptologia},
  volume       = {20},
  number       = {4},
  pages        = {330--340},
  year         = {1996},
  url          = {https://doi.org/10.1080/0161-119691885013},
  doi          = {10.1080/0161-119691885013},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Erskine96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/GilloglyH96,
  author       = {James J. Gillogly and
                  Larry Harnisch},
  title        = {Cryptograms from the Crypt},
  journal      = {Cryptologia},
  volume       = {20},
  number       = {4},
  pages        = {325--329},
  year         = {1996},
  url          = {https://doi.org/10.1080/0161-119691885004},
  doi          = {10.1080/0161-119691885004},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/GilloglyH96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Golomb96,
  author       = {Solomon W. Golomb},
  title        = {On Factoring Jevons' Number},
  journal      = {Cryptologia},
  volume       = {20},
  number       = {3},
  pages        = {243--246},
  year         = {1996},
  url          = {https://doi.org/10.1080/0161-119691884933},
  doi          = {10.1080/0161-119691884933},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Golomb96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/HeysT96,
  author       = {Howard M. Heys and
                  Stafford E. Tavares},
  title        = {Cryptanalysis of Substitution-Permutation Networks Using Key-Dependent
                  Degeneracy},
  journal      = {Cryptologia},
  volume       = {20},
  number       = {3},
  pages        = {258--274},
  year         = {1996},
  url          = {https://doi.org/10.1080/0161-119691884951},
  doi          = {10.1080/0161-119691884951},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/HeysT96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Hinsley96,
  author       = {Harry Hinsley},
  title        = {The Counterfactual History of no Ultra},
  journal      = {Cryptologia},
  volume       = {20},
  number       = {4},
  pages        = {308--324},
  year         = {1996},
  url          = {https://doi.org/10.1080/0161-119691884997},
  doi          = {10.1080/0161-119691884997},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Hinsley96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kahn96,
  author       = {David Kahn},
  title        = {Some Early Hungarian communist Ciphers},
  journal      = {Cryptologia},
  volume       = {20},
  number       = {4},
  pages        = {347--358},
  year         = {1996},
  url          = {https://doi.org/10.1080/0161-119691885031},
  doi          = {10.1080/0161-119691885031},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kahn96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kak96,
  author       = {Subhash C. Kak},
  title        = {An Indus-Sarasvat{\={\i}} Signboard},
  journal      = {Cryptologia},
  volume       = {20},
  number       = {3},
  pages        = {275--279},
  year         = {1996},
  url          = {https://doi.org/10.1080/0161-119691884960},
  doi          = {10.1080/0161-119691884960},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kak96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kruh96,
  author       = {Louis Kruh},
  title        = {Reviews and Things Cryptologic},
  journal      = {Cryptologia},
  volume       = {20},
  number       = {1},
  pages        = {14--36},
  year         = {1996},
  url          = {https://doi.org/10.1080/0161-119691884753},
  doi          = {10.1080/0161-119691884753},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kruh96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kruh96a,
  author       = {Louis Kruh},
  title        = {Reviews and Things Cryptologic},
  journal      = {Cryptologia},
  volume       = {20},
  number       = {2},
  pages        = {183--191},
  year         = {1996},
  url          = {https://doi.org/10.1080/0161-119691884898},
  doi          = {10.1080/0161-119691884898},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kruh96a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kruh96b,
  author       = {Louis Kruh},
  title        = {Reviews and Things Cryptologic},
  journal      = {Cryptologia},
  volume       = {20},
  number       = {3},
  pages        = {280--288},
  year         = {1996},
  url          = {https://doi.org/10.1080/0161-119691884979},
  doi          = {10.1080/0161-119691884979},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kruh96b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kruh96c,
  author       = {Louis Kruh},
  title        = {Reviews and Things Cryptologic},
  journal      = {Cryptologia},
  volume       = {20},
  number       = {4},
  pages        = {365--380},
  year         = {1996},
  url          = {https://doi.org/10.1080/0161-119691885059},
  doi          = {10.1080/0161-119691885059},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kruh96c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Leary96,
  author       = {Thomas Leary},
  title        = {Cryptology in the 15th and 16th Century},
  journal      = {Cryptologia},
  volume       = {20},
  number       = {3},
  pages        = {223--242},
  year         = {1996},
  url          = {https://doi.org/10.1080/0161-119691884924},
  doi          = {10.1080/0161-119691884924},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Leary96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/LeightonM96,
  author       = {Albert C. Leighton and
                  Greg E. Mellen},
  title        = {A Mystery Solved},
  journal      = {Cryptologia},
  volume       = {20},
  number       = {4},
  pages        = {346},
  year         = {1996},
  url          = {https://doi.org/10.1080/0161-119691885022},
  doi          = {10.1080/0161-119691885022},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/LeightonM96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Mellen96,
  author       = {Greg E. Mellen},
  title        = {Some Adventures in Cryptoland},
  journal      = {Cryptologia},
  volume       = {20},
  number       = {2},
  pages        = {155--164},
  year         = {1996},
  url          = {https://doi.org/10.1080/0161-119691884861},
  doi          = {10.1080/0161-119691884861},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Mellen96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Meulen96,
  author       = {Michael van der Meulen},
  title        = {Werftschl{\"{u}}ssel: {A} German Navy Hand Cipher System Part
                  {II}},
  journal      = {Cryptologia},
  volume       = {20},
  number       = {1},
  pages        = {37--54},
  year         = {1996},
  url          = {https://doi.org/10.1080/0161-119691884771},
  doi          = {10.1080/0161-119691884771},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Meulen96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Meulen96a,
  author       = {Michael van der Meulen},
  title        = {Reihenschieber},
  journal      = {Cryptologia},
  volume       = {20},
  number       = {2},
  pages        = {141--154},
  year         = {1996},
  url          = {https://doi.org/10.1080/0161-119691884852},
  doi          = {10.1080/0161-119691884852},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Meulen96a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Meulen96b,
  author       = {Michael van der Meulen},
  title        = {Cryptology in the Early Bundesrepublik},
  journal      = {Cryptologia},
  volume       = {20},
  number       = {3},
  pages        = {202--222},
  year         = {1996},
  url          = {https://doi.org/10.1080/0161-119691884915},
  doi          = {10.1080/0161-119691884915},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Meulen96b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Ratcliff96,
  author       = {Rebecca A. Ratcliff},
  title        = {Cryptology and World War {II:} NSA's 1995 History Symposium},
  journal      = {Cryptologia},
  volume       = {20},
  number       = {2},
  pages        = {135--140},
  year         = {1996},
  url          = {https://doi.org/10.1080/0161-119691884843},
  doi          = {10.1080/0161-119691884843},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Ratcliff96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Rubin96,
  author       = {Frank Rubin},
  title        = {Designing a High-Security Cipher},
  journal      = {Cryptologia},
  volume       = {20},
  number       = {3},
  pages        = {247--257},
  year         = {1996},
  url          = {https://doi.org/10.1080/0161-119691884942},
  doi          = {10.1080/0161-119691884942},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Rubin96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Rubin96a,
  author       = {Frank Rubin},
  title        = {One-Time Pad Cryptography},
  journal      = {Cryptologia},
  volume       = {20},
  number       = {4},
  pages        = {359--364},
  year         = {1996},
  url          = {https://doi.org/10.1080/0161-119691885040},
  doi          = {10.1080/0161-119691885040},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Rubin96a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Schaefer96,
  author       = {Edward F. Schaefer},
  title        = {A Simplified Data Encryption Standard Algorithm},
  journal      = {Cryptologia},
  volume       = {20},
  number       = {1},
  pages        = {77--84},
  year         = {1996},
  url          = {https://doi.org/10.1080/0161-119691884799},
  doi          = {10.1080/0161-119691884799},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Schaefer96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Whitehead96,
  author       = {David Whitehead},
  title        = {Cobra and Other Bombes},
  journal      = {Cryptologia},
  volume       = {20},
  number       = {4},
  pages        = {289--307},
  year         = {1996},
  url          = {https://doi.org/10.1080/0161-119691884988},
  doi          = {10.1080/0161-119691884988},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Whitehead96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Winkel96,
  author       = {Brian J. Winkel},
  title        = {Twenty Years and Counting},
  journal      = {Cryptologia},
  volume       = {20},
  number       = {4},
  pages        = {381},
  year         = {1996},
  url          = {https://doi.org/10.1080/0161-119691885068},
  doi          = {10.1080/0161-119691885068},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Winkel96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Alvarez95,
  author       = {David Alvarez},
  title        = {A Dutch Enciphered Code},
  journal      = {Cryptologia},
  volume       = {19},
  number       = {3},
  pages        = {261--264},
  year         = {1995},
  url          = {https://doi.org/10.1080/0161-119591883935},
  doi          = {10.1080/0161-119591883935},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Alvarez95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Davies95,
  author       = {Donald W. Davies},
  title        = {The Lorenz Cipher Machine Sz42},
  journal      = {Cryptologia},
  volume       = {19},
  number       = {1},
  pages        = {39--61},
  year         = {1995},
  url          = {https://doi.org/10.1080/0161-119591883755},
  doi          = {10.1080/0161-119591883755},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Davies95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Deavours95,
  author       = {Cipher A. Deavours},
  title        = {The Autoscritcher},
  journal      = {Cryptologia},
  volume       = {19},
  number       = {2},
  pages        = {137--148},
  year         = {1995},
  url          = {https://doi.org/10.1080/0161-119591883827},
  doi          = {10.1080/0161-119591883827},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Deavours95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Denniston95,
  author       = {Robin Denniston},
  title        = {Fetterlein and Others},
  journal      = {Cryptologia},
  volume       = {19},
  number       = {1},
  pages        = {62--64},
  year         = {1995},
  url          = {https://doi.org/10.1080/0161-119591883764},
  doi          = {10.1080/0161-119591883764},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Denniston95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Drea95,
  author       = {Edward J. Drea},
  title        = {Were the Japanese Army Codes Secure?},
  journal      = {Cryptologia},
  volume       = {19},
  number       = {2},
  pages        = {113--136},
  year         = {1995},
  url          = {https://doi.org/10.1080/0161-119591883818},
  doi          = {10.1080/0161-119591883818},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Drea95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Erskine95,
  author       = {Ralph Erskine},
  title        = {Ultra and Some U. S. Navy Carrier Operations},
  journal      = {Cryptologia},
  volume       = {19},
  number       = {1},
  pages        = {81--96},
  year         = {1995},
  url          = {https://doi.org/10.1080/0161-119591883782},
  doi          = {10.1080/0161-119591883782},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Erskine95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Foster95,
  author       = {Caxton C. Foster},
  title        = {Secret Musical codewords},
  journal      = {Cryptologia},
  volume       = {19},
  number       = {2},
  pages        = {216},
  year         = {1995},
  url          = {https://doi.org/10.1080/0161-119591883890},
  doi          = {10.1080/0161-119591883890},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Foster95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Gaddy95,
  author       = {David W. Gaddy},
  title        = {The Cylinder-Cipher},
  journal      = {Cryptologia},
  volume       = {19},
  number       = {4},
  pages        = {385--391},
  year         = {1995},
  url          = {https://doi.org/10.1080/0161-119591884033},
  doi          = {10.1080/0161-119591884033},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Gaddy95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Gillogly95,
  author       = {James J. Gillogly},
  title        = {Ciphertext-only Cryptanalysis of Enigma},
  journal      = {Cryptologia},
  volume       = {19},
  number       = {4},
  pages        = {405--413},
  year         = {1995},
  url          = {https://doi.org/10.1080/0161-119591884060},
  doi          = {10.1080/0161-119591884060},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Gillogly95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Jakobsen95,
  author       = {Thomas Jakobsen},
  title        = {A Fast Method for Cryptanalysis of Substitution Ciphers},
  journal      = {Cryptologia},
  volume       = {19},
  number       = {3},
  pages        = {265--274},
  year         = {1995},
  url          = {https://doi.org/10.1080/0161-119591883944},
  doi          = {10.1080/0161-119591883944},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Jakobsen95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Johnson95,
  author       = {Tom Johnson},
  title        = {The Mystery of an Old Japanese Codebook},
  journal      = {Cryptologia},
  volume       = {19},
  number       = {4},
  pages        = {380--384},
  year         = {1995},
  url          = {https://doi.org/10.1080/0161-119591884024},
  doi          = {10.1080/0161-119591884024},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Johnson95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Johnson95a,
  author       = {Mike Johnson},
  title        = {Cryptology in Cyberspace},
  journal      = {Cryptologia},
  volume       = {19},
  number       = {4},
  pages        = {392--396},
  year         = {1995},
  url          = {https://doi.org/10.1080/0161-119591884042},
  doi          = {10.1080/0161-119591884042},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Johnson95a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kahn95,
  author       = {David Kahn},
  title        = {The Cryptologic Origin of Braille},
  journal      = {Cryptologia},
  volume       = {19},
  number       = {2},
  pages        = {151--152},
  year         = {1995},
  url          = {https://doi.org/10.1080/0161-119591883845},
  doi          = {10.1080/0161-119591883845},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kahn95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kahn95a,
  author       = {David Kahn},
  title        = {Enemy Codes and their Solution},
  journal      = {Cryptologia},
  volume       = {19},
  number       = {2},
  pages        = {166--197},
  year         = {1995},
  url          = {https://doi.org/10.1080/0161-119591883863},
  doi          = {10.1080/0161-119591883863},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kahn95a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kruh95,
  author       = {Louis Kruh},
  title        = {When a Court ruled for {BACON} Instead of Shakespeare-Temporarily},
  journal      = {Cryptologia},
  volume       = {19},
  number       = {1},
  pages        = {24--38},
  year         = {1995},
  url          = {https://doi.org/10.1080/0161-119591883746},
  doi          = {10.1080/0161-119591883746},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kruh95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kruh95a,
  author       = {Louis Kruh},
  title        = {In the Name of Intelligence: Essays in Honor of Walter Pforzheimer
                  Book Review},
  journal      = {Cryptologia},
  volume       = {19},
  number       = {1},
  pages        = {97--101},
  year         = {1995},
  url          = {https://doi.org/10.1080/0161-119591883791},
  doi          = {10.1080/0161-119591883791},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kruh95a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kruh95b,
  author       = {Louis Kruh},
  title        = {Reviews and Things Cryptologic},
  journal      = {Cryptologia},
  volume       = {19},
  number       = {1},
  pages        = {102--112},
  year         = {1995},
  url          = {https://doi.org/10.1080/0161-119591883809},
  doi          = {10.1080/0161-119591883809},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kruh95b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kruh95c,
  author       = {Louis Kruh},
  title        = {Reviews and Things Cryptologic},
  journal      = {Cryptologia},
  volume       = {19},
  number       = {2},
  pages        = {209--215},
  year         = {1995},
  url          = {https://doi.org/10.1080/0161-119591883881},
  doi          = {10.1080/0161-119591883881},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kruh95c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kruh95d,
  author       = {Louis Kruh},
  title        = {Reviews and Things Cryptologic},
  journal      = {Cryptologia},
  volume       = {19},
  number       = {3},
  pages        = {300--318},
  year         = {1995},
  url          = {https://doi.org/10.1080/0161-119591883971},
  doi          = {10.1080/0161-119591883971},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kruh95d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kruh95e,
  author       = {Louis Kruh},
  title        = {Reviews and Things Cryptologic},
  journal      = {Cryptologia},
  volume       = {19},
  number       = {4},
  pages        = {365--374},
  year         = {1995},
  url          = {https://doi.org/10.1080/0161-119591884015},
  doi          = {10.1080/0161-119591884015},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kruh95e.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kruth95,
  author       = {Louis Kruth},
  title        = {Riverbank Laboratory Correspondence, 1919 {(SRH-50)}},
  journal      = {Cryptologia},
  volume       = {19},
  number       = {3},
  pages        = {236--246},
  year         = {1995},
  url          = {https://doi.org/10.1080/0161-119591883917},
  doi          = {10.1080/0161-119591883917},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kruth95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/LeeuwM95,
  author       = {Karl de Leeuw and
                  Hans van der Meer},
  title        = {A Turning grille from the Ancestral Castle of the Dutch Stadtholders},
  journal      = {Cryptologia},
  volume       = {19},
  number       = {2},
  pages        = {153--165},
  year         = {1995},
  url          = {https://doi.org/10.1080/0161-119591883854},
  doi          = {10.1080/0161-119591883854},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/LeeuwM95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/LiawL95,
  author       = {Horng{-}Twu Liaw and
                  Chin{-}Laung Lei},
  title        = {An Efficient Password Authentication Scheme Based on a Unit Circle},
  journal      = {Cryptologia},
  volume       = {19},
  number       = {2},
  pages        = {198--208},
  year         = {1995},
  url          = {https://doi.org/10.1080/0161-119591883872},
  doi          = {10.1080/0161-119591883872},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/LiawL95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Meulen95,
  author       = {Michael van der Meulen},
  title        = {The Book Cipher System of the \emph{Wehrmacht}},
  journal      = {Cryptologia},
  volume       = {19},
  number       = {3},
  pages        = {247--260},
  year         = {1995},
  url          = {https://doi.org/10.1080/0161-119591883926},
  doi          = {10.1080/0161-119591883926},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Meulen95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Meulen95a,
  author       = {Michael van der Meulen},
  title        = {Werftschl{\"{u}}ssel: {A} German Navy Hand Cipher System Part
                  {I}},
  journal      = {Cryptologia},
  volume       = {19},
  number       = {4},
  pages        = {349--364},
  year         = {1995},
  url          = {https://doi.org/10.1080/0161-119591884006},
  doi          = {10.1080/0161-119591884006},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Meulen95a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Miller95,
  author       = {A. Ray Miller},
  title        = {The Cryptographic Mathematics of Enigma},
  journal      = {Cryptologia},
  volume       = {19},
  number       = {1},
  pages        = {65--80},
  year         = {1995},
  url          = {https://doi.org/10.1080/0161-119591883773},
  doi          = {10.1080/0161-119591883773},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Miller95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Reeds95,
  author       = {Jim Reeds},
  title        = {William F. Friedman's transcription of the Voynich Manuscript},
  journal      = {Cryptologia},
  volume       = {19},
  number       = {1},
  pages        = {1--23},
  year         = {1995},
  url          = {https://doi.org/10.1080/0161-119591883737},
  doi          = {10.1080/0161-119591883737},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Reeds95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Rubin95,
  author       = {Frank Rubin},
  title        = {The Quadratic and Double Quadratic Residue Ciphers},
  journal      = {Cryptologia},
  volume       = {19},
  number       = {3},
  pages        = {275--284},
  year         = {1995},
  url          = {https://doi.org/10.1080/0161-119591883953},
  doi          = {10.1080/0161-119591883953},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Rubin95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Rubin95a,
  author       = {Frank Rubin},
  title        = {Message Authentication Using Quadratic residues},
  journal      = {Cryptologia},
  volume       = {19},
  number       = {4},
  pages        = {397--404},
  year         = {1995},
  url          = {https://doi.org/10.1080/0161-119591884051},
  doi          = {10.1080/0161-119591884051},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Rubin95a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Schlesinger95,
  author       = {Stephen Schlesinger},
  title        = {Cryptanalysis for Peacetime: Codebreaking and the Birth and Structure
                  of the United Nations},
  journal      = {Cryptologia},
  volume       = {19},
  number       = {3},
  pages        = {217--235},
  year         = {1995},
  url          = {https://doi.org/10.1080/0161-119591883908},
  doi          = {10.1080/0161-119591883908},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Schlesinger95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Wayner95,
  author       = {Peter Wayner},
  title        = {Strong Theoretical Stegnography},
  journal      = {Cryptologia},
  volume       = {19},
  number       = {3},
  pages        = {285--299},
  year         = {1995},
  url          = {https://doi.org/10.1080/0161-119591883962},
  doi          = {10.1080/0161-119591883962},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Wayner95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Weber95,
  author       = {Ralph E. Weber},
  title        = {Seward's Other Folly: the Fight over America's First Encrypted Cable},
  journal      = {Cryptologia},
  volume       = {19},
  number       = {4},
  pages        = {321--348},
  year         = {1995},
  url          = {https://doi.org/10.1080/0161-119591883999},
  doi          = {10.1080/0161-119591883999},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Weber95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/CarrollN94,
  author       = {John M. Carroll and
                  Sri Nurdiati},
  title        = {Weak Keys and Weak Data Foiling the Two Nemeses},
  journal      = {Cryptologia},
  volume       = {18},
  number       = {3},
  pages        = {253--280},
  year         = {1994},
  url          = {https://doi.org/10.1080/0161-119491882892},
  doi          = {10.1080/0161-119491882892},
  timestamp    = {Thu, 30 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/CarrollN94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Corcoran94,
  author       = {William J. Corcoran},
  title        = {A Multiloop Vigen{\`{e}}Re Cipher with Exceptionally Long Component
                  Series},
  journal      = {Cryptologia},
  volume       = {18},
  number       = {4},
  pages        = {356--371},
  year         = {1994},
  url          = {https://doi.org/10.1080/0161-119491882937},
  doi          = {10.1080/0161-119491882937},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Corcoran94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Davies94,
  author       = {Donald W. Davies},
  title        = {New Information on the History of the Siemens and Halske {T52} Cipher
                  Machines},
  journal      = {Cryptologia},
  volume       = {18},
  number       = {2},
  pages        = {141--146},
  year         = {1994},
  url          = {https://doi.org/10.1080/0161-119491882801},
  doi          = {10.1080/0161-119491882801},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Davies94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/DawsonC94,
  author       = {Ed Dawson and
                  Andrew J. Clark},
  title        = {Divide and Conquer Attacks on Certain Classes of Stream Ciphers},
  journal      = {Cryptologia},
  volume       = {18},
  number       = {1},
  pages        = {25--40},
  year         = {1994},
  url          = {https://doi.org/10.1080/0161-119491882757},
  doi          = {10.1080/0161-119491882757},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/DawsonC94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Deavours94,
  author       = {Cipher A. Deavours},
  title        = {Those Brilliant Brits: Book Review},
  journal      = {Cryptologia},
  volume       = {18},
  number       = {1},
  pages        = {22--24},
  year         = {1994},
  url          = {https://doi.org/10.1080/0161-119491882748},
  doi          = {10.1080/0161-119491882748},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Deavours94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Denniston94,
  author       = {Robin Denniston},
  title        = {Yardley's Diplomatic Secrets},
  journal      = {Cryptologia},
  volume       = {18},
  number       = {2},
  pages        = {81--127},
  year         = {1994},
  url          = {https://doi.org/10.1080/0161-119491882784},
  doi          = {10.1080/0161-119491882784},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Denniston94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/GanesanS94,
  author       = {Ravi Ganesan and
                  Alan T. Sherman},
  title        = {Statistical Techniques for Language Recognition: an Empirical Study
                  Using Real and Simulated English},
  journal      = {Cryptologia},
  volume       = {18},
  number       = {4},
  pages        = {289--331},
  year         = {1994},
  url          = {https://doi.org/10.1080/0161-119491882919},
  doi          = {10.1080/0161-119491882919},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/GanesanS94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Greenfield94,
  author       = {Gary R. Greenfield},
  title        = {Yet Another Matrix Cryptosystem},
  journal      = {Cryptologia},
  volume       = {18},
  number       = {1},
  pages        = {41--51},
  year         = {1994},
  url          = {https://doi.org/10.1080/0161-119491882766},
  doi          = {10.1080/0161-119491882766},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Greenfield94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/HagelinK94,
  author       = {Boris C. W. Hagelin and
                  David Kahn},
  title        = {The Story of the Hagelin Cryptos},
  journal      = {Cryptologia},
  volume       = {18},
  number       = {3},
  pages        = {204--242},
  year         = {1994},
  url          = {https://doi.org/10.1080/0161-119491882865},
  doi          = {10.1080/0161-119491882865},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/HagelinK94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Halligan94,
  author       = {J. Halligan},
  title        = {Radio Intelligence and Communication Security},
  journal      = {Cryptologia},
  volume       = {18},
  number       = {1},
  pages        = {52--79},
  year         = {1994},
  url          = {https://doi.org/10.1080/0161-119491882775},
  doi          = {10.1080/0161-119491882775},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Halligan94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kahn94,
  author       = {David Kahn},
  title        = {From the Archives a Real Fake Message},
  journal      = {Cryptologia},
  volume       = {18},
  number       = {2},
  pages        = {150--152},
  year         = {1994},
  url          = {https://doi.org/10.1080/0161-119491882829},
  doi          = {10.1080/0161-119491882829},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kahn94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/King94,
  author       = {John C. King},
  title        = {An Algorithm for the Complete Automated Cryptanalysis of Periodic
                  Polyalphabetic Substitution Ciphers},
  journal      = {Cryptologia},
  volume       = {18},
  number       = {4},
  pages        = {332--355},
  year         = {1994},
  url          = {https://doi.org/10.1080/0161-119491882928},
  doi          = {10.1080/0161-119491882928},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/King94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kruh94,
  author       = {Louis Kruh},
  title        = {Reviews and Things Cryptologic},
  journal      = {Cryptologia},
  volume       = {18},
  number       = {1},
  pages        = {1--21},
  year         = {1994},
  url          = {https://doi.org/10.1080/0161-119491882739},
  doi          = {10.1080/0161-119491882739},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kruh94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kruh94a,
  author       = {Louis Kruh},
  title        = {Reviews and Things Cryptologic},
  journal      = {Cryptologia},
  volume       = {18},
  number       = {2},
  pages        = {128--140},
  year         = {1994},
  url          = {https://doi.org/10.1080/0161-119491882793},
  doi          = {10.1080/0161-119491882793},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kruh94a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kruh94b,
  author       = {Louis Kruh},
  title        = {The Postal Service Fails to Deliver the Goods},
  journal      = {Cryptologia},
  volume       = {18},
  number       = {3},
  pages        = {250--252},
  year         = {1994},
  url          = {https://doi.org/10.1080/0161-119491882883},
  doi          = {10.1080/0161-119491882883},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kruh94b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kruh94c,
  author       = {Louis Kruh},
  title        = {Reviews and Things Cryptologic},
  journal      = {Cryptologia},
  volume       = {18},
  number       = {3},
  pages        = {281--287},
  year         = {1994},
  url          = {https://doi.org/10.1080/0161-119491882900},
  doi          = {10.1080/0161-119491882900},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kruh94c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kruh94d,
  author       = {Louis Kruh},
  title        = {A Pictorial Tour of the National Cryptologic Museum},
  journal      = {Cryptologia},
  volume       = {18},
  number       = {4},
  pages        = {381--389},
  year         = {1994},
  url          = {https://doi.org/10.1080/0161-119491882955},
  doi          = {10.1080/0161-119491882955},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kruh94d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kruh94e,
  author       = {Louis Kruh},
  title        = {Reviews and Things Cryptologic},
  journal      = {Cryptologia},
  volume       = {18},
  number       = {4},
  pages        = {390--398},
  year         = {1994},
  url          = {https://doi.org/10.1080/0161-119491882964},
  doi          = {10.1080/0161-119491882964},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kruh94e.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/LiHL94,
  author       = {Chuan{-}Ming Li and
                  Tzonelih Hwang and
                  Narn{-}Yih Lee},
  title        = {Conspiracy Attacks on the Threshold {RSA} Signature Scheme},
  journal      = {Cryptologia},
  volume       = {18},
  number       = {4},
  pages        = {372--380},
  year         = {1994},
  url          = {https://doi.org/10.1080/0161-119491882946},
  doi          = {10.1080/0161-119491882946},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/LiHL94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/McKay94,
  author       = {Craig Graham McKay},
  title        = {From the Archives Arvid Damm Makes an Offer},
  journal      = {Cryptologia},
  volume       = {18},
  number       = {3},
  pages        = {243--249},
  year         = {1994},
  url          = {https://doi.org/10.1080/0161-119491882874},
  doi          = {10.1080/0161-119491882874},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/McKay94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Mead94,
  author       = {David Mead},
  title        = {The Breaking of the Japanese Army Administrative Code},
  journal      = {Cryptologia},
  volume       = {18},
  number       = {3},
  pages        = {193--203},
  year         = {1994},
  url          = {https://doi.org/10.1080/0161-119491882856},
  doi          = {10.1080/0161-119491882856},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Mead94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Ritter94,
  author       = {Terry Ritter},
  title        = {Estimating Population from Repetitions in Accumlated Random Samples},
  journal      = {Cryptologia},
  volume       = {18},
  number       = {2},
  pages        = {155--190},
  year         = {1994},
  url          = {https://doi.org/10.1080/0161-119491882847},
  doi          = {10.1080/0161-119491882847},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Ritter94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Rubin94,
  author       = {Frank Rubin},
  title        = {Comments on "Cryptanalysis of Knapsack Ciphers Using Genetic Algorithms"},
  journal      = {Cryptologia},
  volume       = {18},
  number       = {2},
  pages        = {153--154},
  year         = {1994},
  url          = {https://doi.org/10.1080/0161-119491882838},
  doi          = {10.1080/0161-119491882838},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Rubin94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Selmer94,
  author       = {Ernst S. Selmer},
  title        = {The Norwegian Modification of the Siemens and Halske T52e Cipher Machines},
  journal      = {Cryptologia},
  volume       = {18},
  number       = {2},
  pages        = {147--149},
  year         = {1994},
  url          = {https://doi.org/10.1080/0161-119491882810},
  doi          = {10.1080/0161-119491882810},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Selmer94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Alvarez93,
  author       = {David Alvarez},
  title        = {The Papal Cipher Section in the Early Nineteenth Century},
  journal      = {Cryptologia},
  volume       = {17},
  number       = {2},
  pages        = {219--224},
  year         = {1993},
  url          = {https://doi.org/10.1080/0161-119391867881},
  doi          = {10.1080/0161-119391867881},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Alvarez93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Burke93,
  author       = {Colin B. Burke},
  title        = {An Introduction to an Historic Computer Document the 1946 Pendergass
                  Report Cryptanalysis and the Digital Computer},
  journal      = {Cryptologia},
  volume       = {17},
  number       = {2},
  pages        = {113--123},
  year         = {1993},
  url          = {https://doi.org/10.1080/0161-119391867809},
  doi          = {10.1080/0161-119391867809},
  timestamp    = {Thu, 03 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Burke93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/ChangH93,
  author       = {Chin{-}Chen Chang and
                  Ren{-}Junn Hwang},
  title        = {Master Keys for an {M} \({}^{\mbox{ 3 }}\) Cryptoscheme},
  journal      = {Cryptologia},
  volume       = {17},
  number       = {2},
  pages        = {175--186},
  year         = {1993},
  url          = {https://doi.org/10.1080/0161-119391867854},
  doi          = {10.1080/0161-119391867854},
  timestamp    = {Tue, 23 Jan 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/ChangH93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/ChinWH93,
  author       = {Yuan{-}Chung Chin and
                  PeCheng Wang and
                  Jing{-}Jang Hwang},
  title        = {Cryptanalysis on Schwartz Graphical Encryption Method},
  journal      = {Cryptologia},
  volume       = {17},
  number       = {3},
  pages        = {301--304},
  year         = {1993},
  url          = {https://doi.org/10.1080/0161-119391867962},
  doi          = {10.1080/0161-119391867962},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/ChinWH93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/GanesanS93,
  author       = {Ravi Ganesan and
                  Alan T. Sherman},
  title        = {Statistical Techniques for Language Recognition: an Introduction and
                  Guide for Cryptanalysts},
  journal      = {Cryptologia},
  volume       = {17},
  number       = {4},
  pages        = {321--366},
  year         = {1993},
  url          = {https://doi.org/10.1080/0161-119391867980},
  doi          = {10.1080/0161-119391867980},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/GanesanS93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kahn93,
  author       = {David Kahn},
  title        = {An Enigma Chronology},
  journal      = {Cryptologia},
  volume       = {17},
  number       = {3},
  pages        = {237--246},
  year         = {1993},
  url          = {https://doi.org/10.1080/0161-119391867908},
  doi          = {10.1080/0161-119391867908},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kahn93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kahn93a,
  author       = {David Kahn},
  title        = {Compromise of Naval Code {F-3}},
  journal      = {Cryptologia},
  volume       = {17},
  number       = {3},
  pages        = {247--250},
  year         = {1993},
  url          = {https://doi.org/10.1080/0161-119391867917},
  doi          = {10.1080/0161-119391867917},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kahn93a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/King93,
  author       = {John C. King},
  title        = {A Reconstruction of the Key to Beale Cipher Number Two},
  journal      = {Cryptologia},
  volume       = {17},
  number       = {3},
  pages        = {305--317},
  year         = {1993},
  url          = {https://doi.org/10.1080/0161-119391867971},
  doi          = {10.1080/0161-119391867971},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/King93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/KingB93,
  author       = {John C. King and
                  Dennis R. Bahler},
  title        = {An Algorithmic Solution of Sequential Homophonic Ciphers},
  journal      = {Cryptologia},
  volume       = {17},
  number       = {2},
  pages        = {148--165},
  year         = {1993},
  url          = {https://doi.org/10.1080/0161-119391867827},
  doi          = {10.1080/0161-119391867827},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/KingB93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kruh93,
  author       = {Louis Kruh},
  title        = {Reviews and Things Cryptologic},
  journal      = {Cryptologia},
  volume       = {17},
  number       = {2},
  pages        = {166--171},
  year         = {1993},
  url          = {https://doi.org/10.1080/0161-119391867836},
  doi          = {10.1080/0161-119391867836},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kruh93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kruh93a,
  author       = {Louis Kruh},
  title        = {A 77-Year Old Challenge Cipher},
  journal      = {Cryptologia},
  volume       = {17},
  number       = {2},
  pages        = {172--174},
  year         = {1993},
  url          = {https://doi.org/10.1080/0161-119391867845},
  doi          = {10.1080/0161-119391867845},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kruh93a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kruh93b,
  author       = {Louis Kruh},
  title        = {Reviews and Things Cryptologic},
  journal      = {Cryptologia},
  volume       = {17},
  number       = {3},
  pages        = {251--263},
  year         = {1993},
  url          = {https://doi.org/10.1080/0161-119391867926},
  doi          = {10.1080/0161-119391867926},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kruh93b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kruh93c,
  author       = {Louis Kruh},
  title        = {Reviews and Things Cryptologic},
  journal      = {Cryptologia},
  volume       = {17},
  number       = {4},
  pages        = {378--394},
  year         = {1993},
  url          = {https://doi.org/10.1080/0161-119391868006},
  doi          = {10.1080/0161-119391868006},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kruh93c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/LeeuwM93,
  author       = {Karl de Leeuw and
                  Hans van der Meer},
  title        = {A Homophonic Substitution in the Archives of the Last Great Pensionary
                  of Holland},
  journal      = {Cryptologia},
  volume       = {17},
  number       = {3},
  pages        = {225--236},
  year         = {1993},
  url          = {https://doi.org/10.1080/0161-119391867890},
  doi          = {10.1080/0161-119391867890},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/LeeuwM93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Leighton93,
  author       = {Albert C. Leighton},
  title        = {The Statesman Who Could not Read His Own Mail},
  journal      = {Cryptologia},
  volume       = {17},
  number       = {4},
  pages        = {395--402},
  year         = {1993},
  url          = {https://doi.org/10.1080/0161-119391868015},
  doi          = {10.1080/0161-119391868015},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Leighton93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Matthews93,
  author       = {Robert A. J. Matthews},
  title        = {The Use of Genetic Algorithms in Cryptanalysis},
  journal      = {Cryptologia},
  volume       = {17},
  number       = {2},
  pages        = {187--201},
  year         = {1993},
  url          = {https://doi.org/10.1080/0161-119391867863},
  doi          = {10.1080/0161-119391867863},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Matthews93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Nenninger93,
  author       = {Timothy K. Nenninger},
  title        = {Japanese Codebook Find},
  journal      = {Cryptologia},
  volume       = {17},
  number       = {3},
  pages        = {283--284},
  year         = {1993},
  url          = {https://doi.org/10.1080/0161-119391867944},
  doi          = {10.1080/0161-119391867944},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Nenninger93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Pendergrass93,
  author       = {James T. Pendergrass},
  title        = {Cryptanalytic Use of High-Speed Digital Computing Machines},
  journal      = {Cryptologia},
  volume       = {17},
  number       = {2},
  pages        = {124--147},
  year         = {1993},
  url          = {https://doi.org/10.1080/0161-119391867818},
  doi          = {10.1080/0161-119391867818},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Pendergrass93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/RameshAT93,
  author       = {R. S. Ramesh and
                  G. Athithan and
                  K. Thiruvengadam},
  title        = {An Automated Approach to Solve Simple Substitution Ciphers},
  journal      = {Cryptologia},
  volume       = {17},
  number       = {2},
  pages        = {202--218},
  year         = {1993},
  url          = {https://doi.org/10.1080/0161-119391867872},
  doi          = {10.1080/0161-119391867872},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/RameshAT93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Ruland93,
  author       = {Christoph Ruland},
  title        = {Realizing Digital Signatures with One-Way Hash Functions},
  journal      = {Cryptologia},
  volume       = {17},
  number       = {3},
  pages        = {285--300},
  year         = {1993},
  url          = {https://doi.org/10.1080/0161-119391867953},
  doi          = {10.1080/0161-119391867953},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Ruland93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/ShepherdSS93,
  author       = {Simon J. Shepherd and
                  Peter W. Sanders and
                  Colin T. Stockel},
  title        = {The Quadratic Residue Cipher and Some Notes on Implementation},
  journal      = {Cryptologia},
  volume       = {17},
  number       = {3},
  pages        = {264--282},
  year         = {1993},
  url          = {https://doi.org/10.1080/0161-119391867935},
  doi          = {10.1080/0161-119391867935},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/ShepherdSS93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/SmythS93,
  author       = {William F. Smyth and
                  Reihaneh Safavi{-}Naini},
  title        = {Automated Cryptanalysis of Substitution Ciphers},
  journal      = {Cryptologia},
  volume       = {17},
  number       = {4},
  pages        = {407--418},
  year         = {1993},
  url          = {https://doi.org/10.1080/0161-119391868033},
  doi          = {10.1080/0161-119391868033},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/SmythS93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics