Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/cryptologia/cryptologia13.bht:"
@article{DBLP:journals/cryptologia/Anderson89, author = {Roland Anderson}, title = {Cryptanalytig Properties of Short Substitution Ciphers}, journal = {Cryptologia}, volume = {13}, number = {1}, pages = {61--72}, year = {1989}, url = {https://doi.org/10.1080/0161-118991863772}, doi = {10.1080/0161-118991863772}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Anderson89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Anderson89a, author = {Roland Anderson}, title = {Recognizing Complete and Partial Plaintext}, journal = {Cryptologia}, volume = {13}, number = {2}, pages = {161--166}, year = {1989}, url = {https://doi.org/10.1080/0161-118991863871}, doi = {10.1080/0161-118991863871}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Anderson89a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/August89, author = {David A. August}, title = {Cryptography and Exploitation of Chinese Manual Cryptosystems Part {I:} the Encoding Problem}, journal = {Cryptologia}, volume = {13}, number = {4}, pages = {289--302}, year = {1989}, url = {https://doi.org/10.1080/0161-118991863970}, doi = {10.1080/0161-118991863970}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/August89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Belkora89, author = {Jeff Belkora}, title = {Belkoranic Hill Ciphering}, journal = {Cryptologia}, volume = {13}, number = {1}, pages = {43--49}, year = {1989}, url = {https://doi.org/10.1080/0161-118991863754}, doi = {10.1080/0161-118991863754}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Belkora89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Blackman89, author = {Deane R. Blackman}, title = {The Gromark Cipher, and Some Relatives}, journal = {Cryptologia}, volume = {13}, number = {3}, pages = {273--282}, year = {1989}, url = {https://doi.org/10.1080/0161-118991863961}, doi = {10.1080/0161-118991863961}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Blackman89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Boyd89, author = {Carl Boyd}, title = {Anguish under Siege: High-Grade Japanese Signal Intelligence and the Fall of Berlin}, journal = {Cryptologia}, volume = {13}, number = {3}, pages = {193--209}, year = {1989}, url = {https://doi.org/10.1080/0161-118991863907}, doi = {10.1080/0161-118991863907}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Boyd89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/CarrollR89, author = {John M. Carroll and Lynda E. Robbins}, title = {Computer Cryptanalysis of Product Ciphers}, journal = {Cryptologia}, volume = {13}, number = {4}, pages = {303--326}, year = {1989}, url = {https://doi.org/10.1080/0161-118991863989}, doi = {10.1080/0161-118991863989}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/CarrollR89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Clarke89, author = {William F. Clarke}, title = {Post War Organization}, journal = {Cryptologia}, volume = {13}, number = {2}, pages = {118--122}, year = {1989}, url = {https://doi.org/10.1080/0161-118991863826}, doi = {10.1080/0161-118991863826}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Clarke89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Deavours89, author = {Cipher A. Deavours}, title = {A Ku Klux Klan Cipher}, journal = {Cryptologia}, volume = {13}, number = {3}, pages = {210--214}, year = {1989}, url = {https://doi.org/10.1080/0161-118991863916}, doi = {10.1080/0161-118991863916}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Deavours89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/DeavoursK89, author = {Cipher A. Deavours and Louis Kruh}, title = {The Swedish {HC-9} Ciphering Machine}, journal = {Cryptologia}, volume = {13}, number = {3}, pages = {251--265}, year = {1989}, url = {https://doi.org/10.1080/0161-118991863943}, doi = {10.1080/0161-118991863943}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/DeavoursK89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Erskine89, author = {Ralph Erskine}, title = {From the Archives: a Bletchley Park Assessment of German Intelligence on Torch}, journal = {Cryptologia}, volume = {13}, number = {2}, pages = {135--142}, year = {1989}, url = {https://doi.org/10.1080/0161-118991863844}, doi = {10.1080/0161-118991863844}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Erskine89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Georgiou89, author = {George Georgiou}, title = {A Method to Strengthen Ciphers}, journal = {Cryptologia}, volume = {13}, number = {2}, pages = {151--160}, year = {1989}, url = {https://doi.org/10.1080/0161-118991863862}, doi = {10.1080/0161-118991863862}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Georgiou89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Greenfield89, author = {Gary R. Greenfield}, title = {A Cryptography Course for the University of Richmond}, journal = {Cryptologia}, volume = {13}, number = {1}, pages = {50--60}, year = {1989}, url = {https://doi.org/10.1080/0161-118991863763}, doi = {10.1080/0161-118991863763}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Greenfield89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/GuillouDQ89, author = {Louis C. Guillou and Marc Davio and Jean{-}Jacques Quisquater}, title = {Public-Key Techniques: Randomness and Redundancy}, journal = {Cryptologia}, volume = {13}, number = {2}, pages = {167--189}, year = {1989}, url = {https://doi.org/10.1080/0161-118991863880}, doi = {10.1080/0161-118991863880}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/GuillouDQ89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kahn89, author = {David Kahn}, title = {A Soviet Wiretapping Office}, journal = {Cryptologia}, volume = {13}, number = {2}, pages = {190--191}, year = {1989}, url = {https://doi.org/10.1080/0161-118991863899}, doi = {10.1080/0161-118991863899}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kahn89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kak89, author = {Subhash C. Kak}, title = {A New Method for Coin Flipping by Telephone}, journal = {Cryptologia}, volume = {13}, number = {1}, pages = {73--78}, year = {1989}, url = {https://doi.org/10.1080/0161-118991863781}, doi = {10.1080/0161-118991863781}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kak89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kruh89, author = {Louis Kruh}, title = {The Heraldry of Cryptology - Addendum}, journal = {Cryptologia}, volume = {13}, number = {1}, pages = {79--84}, year = {1989}, url = {https://doi.org/10.1080/0161-118991863790}, doi = {10.1080/0161-118991863790}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kruh89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kruh89a, author = {Louis Kruh}, title = {British-American Cryptanalytic Cooperation and an unprecedented Admission by Winston Churchill}, journal = {Cryptologia}, volume = {13}, number = {2}, pages = {123--134}, year = {1989}, url = {https://doi.org/10.1080/0161-118991863835}, doi = {10.1080/0161-118991863835}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Kruh89a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kruh89b, author = {Louis Kruh}, title = {Reviews and Things Cryptologic}, journal = {Cryptologia}, volume = {13}, number = {3}, pages = {215--242}, year = {1989}, url = {https://doi.org/10.1080/0161-118991863925}, doi = {10.1080/0161-118991863925}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kruh89b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kruh89c, author = {Louis Kruh}, title = {Tales of Yardley: Some Sidelights to His Career}, journal = {Cryptologia}, volume = {13}, number = {4}, pages = {327--358}, year = {1989}, url = {https://doi.org/10.1080/0161-118991863998}, doi = {10.1080/0161-118991863998}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kruh89c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kruh89d, author = {Louis Kruh}, title = {Reviews and Things Cryptologic}, journal = {Cryptologia}, volume = {13}, number = {4}, pages = {359--377}, year = {1989}, url = {https://doi.org/10.1080/0161-118991864005}, doi = {10.1080/0161-118991864005}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kruh89d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/KruhE89, author = {Louis Kruh and Ralph Erskine}, title = {Reviews and Things Cryptologic}, journal = {Cryptologia}, volume = {13}, number = {1}, pages = {85--96}, year = {1989}, url = {https://doi.org/10.1080/0161-118991863808}, doi = {10.1080/0161-118991863808}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/KruhE89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/LevineC89, author = {Jack Levine and Richard Chandler}, title = {The Hill Cryptographic System with Unknown Cipher Alphabet but Known Plaintext}, journal = {Cryptologia}, volume = {13}, number = {1}, pages = {1--28}, year = {1989}, url = {https://doi.org/10.1080/0161-118991863736}, doi = {10.1080/0161-118991863736}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/LevineC89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Mache89, author = {Wolfgang W. Mache}, title = {The Siemens Cipher Teletype in the History of Telecommunications}, journal = {Cryptologia}, volume = {13}, number = {2}, pages = {97--117}, year = {1989}, url = {https://doi.org/10.1080/0161-118991863817}, doi = {10.1080/0161-118991863817}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Mache89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Matthews89, author = {Robert A. J. Matthews}, title = {On the Derivation of a "Chaotic" Encryption Algorithm}, journal = {Cryptologia}, volume = {13}, number = {1}, pages = {29--42}, year = {1989}, url = {https://doi.org/10.1080/0161-118991863745}, doi = {10.1080/0161-118991863745}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Matthews89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Matthews89a, author = {Robert A. J. Matthews}, title = {A Rotor Device for Periodic and Random-Key Encryption}, journal = {Cryptologia}, volume = {13}, number = {3}, pages = {266--272}, year = {1989}, url = {https://doi.org/10.1080/0161-118991863952}, doi = {10.1080/0161-118991863952}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Matthews89a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Myer89, author = {Charles R. Myer}, title = {Viet Cong {SIGINT} and {U.S.} Army {COMSEC} in Vietnam}, journal = {Cryptologia}, volume = {13}, number = {2}, pages = {143--150}, year = {1989}, url = {https://doi.org/10.1080/0161-118991863853}, doi = {10.1080/0161-118991863853}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Myer89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Wheeler89, author = {Daniel D. Wheeler}, title = {Problems with Chaotic Cryptosystems}, journal = {Cryptologia}, volume = {13}, number = {3}, pages = {243--250}, year = {1989}, url = {https://doi.org/10.1080/0161-118991863934}, doi = {10.1080/0161-118991863934}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Wheeler89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.