Search dblp for Publications

export results for "toc:db/journals/cryptologia/cryptologia13.bht:"

 download as .bib file

@article{DBLP:journals/cryptologia/Anderson89,
  author       = {Roland Anderson},
  title        = {Cryptanalytig Properties of Short Substitution Ciphers},
  journal      = {Cryptologia},
  volume       = {13},
  number       = {1},
  pages        = {61--72},
  year         = {1989},
  url          = {https://doi.org/10.1080/0161-118991863772},
  doi          = {10.1080/0161-118991863772},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Anderson89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Anderson89a,
  author       = {Roland Anderson},
  title        = {Recognizing Complete and Partial Plaintext},
  journal      = {Cryptologia},
  volume       = {13},
  number       = {2},
  pages        = {161--166},
  year         = {1989},
  url          = {https://doi.org/10.1080/0161-118991863871},
  doi          = {10.1080/0161-118991863871},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Anderson89a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/August89,
  author       = {David A. August},
  title        = {Cryptography and Exploitation of Chinese Manual Cryptosystems Part
                  {I:} the Encoding Problem},
  journal      = {Cryptologia},
  volume       = {13},
  number       = {4},
  pages        = {289--302},
  year         = {1989},
  url          = {https://doi.org/10.1080/0161-118991863970},
  doi          = {10.1080/0161-118991863970},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/August89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Belkora89,
  author       = {Jeff Belkora},
  title        = {Belkoranic Hill Ciphering},
  journal      = {Cryptologia},
  volume       = {13},
  number       = {1},
  pages        = {43--49},
  year         = {1989},
  url          = {https://doi.org/10.1080/0161-118991863754},
  doi          = {10.1080/0161-118991863754},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Belkora89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Blackman89,
  author       = {Deane R. Blackman},
  title        = {The Gromark Cipher, and Some Relatives},
  journal      = {Cryptologia},
  volume       = {13},
  number       = {3},
  pages        = {273--282},
  year         = {1989},
  url          = {https://doi.org/10.1080/0161-118991863961},
  doi          = {10.1080/0161-118991863961},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Blackman89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Boyd89,
  author       = {Carl Boyd},
  title        = {Anguish under Siege: High-Grade Japanese Signal Intelligence and the
                  Fall of Berlin},
  journal      = {Cryptologia},
  volume       = {13},
  number       = {3},
  pages        = {193--209},
  year         = {1989},
  url          = {https://doi.org/10.1080/0161-118991863907},
  doi          = {10.1080/0161-118991863907},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Boyd89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/CarrollR89,
  author       = {John M. Carroll and
                  Lynda E. Robbins},
  title        = {Computer Cryptanalysis of Product Ciphers},
  journal      = {Cryptologia},
  volume       = {13},
  number       = {4},
  pages        = {303--326},
  year         = {1989},
  url          = {https://doi.org/10.1080/0161-118991863989},
  doi          = {10.1080/0161-118991863989},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/CarrollR89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Clarke89,
  author       = {William F. Clarke},
  title        = {Post War Organization},
  journal      = {Cryptologia},
  volume       = {13},
  number       = {2},
  pages        = {118--122},
  year         = {1989},
  url          = {https://doi.org/10.1080/0161-118991863826},
  doi          = {10.1080/0161-118991863826},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Clarke89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Deavours89,
  author       = {Cipher A. Deavours},
  title        = {A Ku Klux Klan Cipher},
  journal      = {Cryptologia},
  volume       = {13},
  number       = {3},
  pages        = {210--214},
  year         = {1989},
  url          = {https://doi.org/10.1080/0161-118991863916},
  doi          = {10.1080/0161-118991863916},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Deavours89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/DeavoursK89,
  author       = {Cipher A. Deavours and
                  Louis Kruh},
  title        = {The Swedish {HC-9} Ciphering Machine},
  journal      = {Cryptologia},
  volume       = {13},
  number       = {3},
  pages        = {251--265},
  year         = {1989},
  url          = {https://doi.org/10.1080/0161-118991863943},
  doi          = {10.1080/0161-118991863943},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/DeavoursK89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Erskine89,
  author       = {Ralph Erskine},
  title        = {From the Archives: a Bletchley Park Assessment of German Intelligence
                  on Torch},
  journal      = {Cryptologia},
  volume       = {13},
  number       = {2},
  pages        = {135--142},
  year         = {1989},
  url          = {https://doi.org/10.1080/0161-118991863844},
  doi          = {10.1080/0161-118991863844},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Erskine89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Georgiou89,
  author       = {George Georgiou},
  title        = {A Method to Strengthen Ciphers},
  journal      = {Cryptologia},
  volume       = {13},
  number       = {2},
  pages        = {151--160},
  year         = {1989},
  url          = {https://doi.org/10.1080/0161-118991863862},
  doi          = {10.1080/0161-118991863862},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Georgiou89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Greenfield89,
  author       = {Gary R. Greenfield},
  title        = {A Cryptography Course for the University of Richmond},
  journal      = {Cryptologia},
  volume       = {13},
  number       = {1},
  pages        = {50--60},
  year         = {1989},
  url          = {https://doi.org/10.1080/0161-118991863763},
  doi          = {10.1080/0161-118991863763},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Greenfield89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/GuillouDQ89,
  author       = {Louis C. Guillou and
                  Marc Davio and
                  Jean{-}Jacques Quisquater},
  title        = {Public-Key Techniques: Randomness and Redundancy},
  journal      = {Cryptologia},
  volume       = {13},
  number       = {2},
  pages        = {167--189},
  year         = {1989},
  url          = {https://doi.org/10.1080/0161-118991863880},
  doi          = {10.1080/0161-118991863880},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/GuillouDQ89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kahn89,
  author       = {David Kahn},
  title        = {A Soviet Wiretapping Office},
  journal      = {Cryptologia},
  volume       = {13},
  number       = {2},
  pages        = {190--191},
  year         = {1989},
  url          = {https://doi.org/10.1080/0161-118991863899},
  doi          = {10.1080/0161-118991863899},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kahn89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kak89,
  author       = {Subhash C. Kak},
  title        = {A New Method for Coin Flipping by Telephone},
  journal      = {Cryptologia},
  volume       = {13},
  number       = {1},
  pages        = {73--78},
  year         = {1989},
  url          = {https://doi.org/10.1080/0161-118991863781},
  doi          = {10.1080/0161-118991863781},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kak89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kruh89,
  author       = {Louis Kruh},
  title        = {The Heraldry of Cryptology - Addendum},
  journal      = {Cryptologia},
  volume       = {13},
  number       = {1},
  pages        = {79--84},
  year         = {1989},
  url          = {https://doi.org/10.1080/0161-118991863790},
  doi          = {10.1080/0161-118991863790},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kruh89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kruh89a,
  author       = {Louis Kruh},
  title        = {British-American Cryptanalytic Cooperation and an unprecedented Admission
                  by Winston Churchill},
  journal      = {Cryptologia},
  volume       = {13},
  number       = {2},
  pages        = {123--134},
  year         = {1989},
  url          = {https://doi.org/10.1080/0161-118991863835},
  doi          = {10.1080/0161-118991863835},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kruh89a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kruh89b,
  author       = {Louis Kruh},
  title        = {Reviews and Things Cryptologic},
  journal      = {Cryptologia},
  volume       = {13},
  number       = {3},
  pages        = {215--242},
  year         = {1989},
  url          = {https://doi.org/10.1080/0161-118991863925},
  doi          = {10.1080/0161-118991863925},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kruh89b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kruh89c,
  author       = {Louis Kruh},
  title        = {Tales of Yardley: Some Sidelights to His Career},
  journal      = {Cryptologia},
  volume       = {13},
  number       = {4},
  pages        = {327--358},
  year         = {1989},
  url          = {https://doi.org/10.1080/0161-118991863998},
  doi          = {10.1080/0161-118991863998},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kruh89c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kruh89d,
  author       = {Louis Kruh},
  title        = {Reviews and Things Cryptologic},
  journal      = {Cryptologia},
  volume       = {13},
  number       = {4},
  pages        = {359--377},
  year         = {1989},
  url          = {https://doi.org/10.1080/0161-118991864005},
  doi          = {10.1080/0161-118991864005},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kruh89d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/KruhE89,
  author       = {Louis Kruh and
                  Ralph Erskine},
  title        = {Reviews and Things Cryptologic},
  journal      = {Cryptologia},
  volume       = {13},
  number       = {1},
  pages        = {85--96},
  year         = {1989},
  url          = {https://doi.org/10.1080/0161-118991863808},
  doi          = {10.1080/0161-118991863808},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/KruhE89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/LevineC89,
  author       = {Jack Levine and
                  Richard Chandler},
  title        = {The Hill Cryptographic System with Unknown Cipher Alphabet but Known
                  Plaintext},
  journal      = {Cryptologia},
  volume       = {13},
  number       = {1},
  pages        = {1--28},
  year         = {1989},
  url          = {https://doi.org/10.1080/0161-118991863736},
  doi          = {10.1080/0161-118991863736},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/LevineC89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Mache89,
  author       = {Wolfgang W. Mache},
  title        = {The Siemens Cipher Teletype in the History of Telecommunications},
  journal      = {Cryptologia},
  volume       = {13},
  number       = {2},
  pages        = {97--117},
  year         = {1989},
  url          = {https://doi.org/10.1080/0161-118991863817},
  doi          = {10.1080/0161-118991863817},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Mache89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Matthews89,
  author       = {Robert A. J. Matthews},
  title        = {On the Derivation of a "Chaotic" Encryption Algorithm},
  journal      = {Cryptologia},
  volume       = {13},
  number       = {1},
  pages        = {29--42},
  year         = {1989},
  url          = {https://doi.org/10.1080/0161-118991863745},
  doi          = {10.1080/0161-118991863745},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Matthews89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Matthews89a,
  author       = {Robert A. J. Matthews},
  title        = {A Rotor Device for Periodic and Random-Key Encryption},
  journal      = {Cryptologia},
  volume       = {13},
  number       = {3},
  pages        = {266--272},
  year         = {1989},
  url          = {https://doi.org/10.1080/0161-118991863952},
  doi          = {10.1080/0161-118991863952},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Matthews89a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Myer89,
  author       = {Charles R. Myer},
  title        = {Viet Cong {SIGINT} and {U.S.} Army {COMSEC} in Vietnam},
  journal      = {Cryptologia},
  volume       = {13},
  number       = {2},
  pages        = {143--150},
  year         = {1989},
  url          = {https://doi.org/10.1080/0161-118991863853},
  doi          = {10.1080/0161-118991863853},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Myer89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Wheeler89,
  author       = {Daniel D. Wheeler},
  title        = {Problems with Chaotic Cryptosystems},
  journal      = {Cryptologia},
  volume       = {13},
  number       = {3},
  pages        = {243--250},
  year         = {1989},
  url          = {https://doi.org/10.1080/0161-118991863934},
  doi          = {10.1080/0161-118991863934},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Wheeler89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics