Search dblp for Publications

export results for "toc:db/journals/cryptologia/cryptologia14.bht:"

 download as .bib file

@article{DBLP:journals/cryptologia/AbelesL90,
  author       = {Francine F. Abeles and
                  Stanley H. Lipson},
  title        = {Some Victorian Periodic Polyalphabetic Ciphers},
  journal      = {Cryptologia},
  volume       = {14},
  number       = {2},
  pages        = {128--134},
  year         = {1990},
  url          = {https://doi.org/10.1080/0161-119091864823},
  doi          = {10.1080/0161-119091864823},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/AbelesL90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Anderson90,
  author       = {Ross J. Anderson},
  title        = {Solving a Class of Stream Ciphers},
  journal      = {Cryptologia},
  volume       = {14},
  number       = {3},
  pages        = {285--288},
  year         = {1990},
  url          = {https://doi.org/10.1080/0161-119091864977},
  doi          = {10.1080/0161-119091864977},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Anderson90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/August90,
  author       = {David A. August},
  title        = {Cryptography and Exploitation of Chinese Manual Cryptosystems Part
                  {II:} the Encrypting Problem},
  journal      = {Cryptologia},
  volume       = {14},
  number       = {1},
  pages        = {61--78},
  year         = {1990},
  url          = {https://doi.org/10.1080/0161-119091864788},
  doi          = {10.1080/0161-119091864788},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/August90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/BaldwinS90,
  author       = {Robert W. Baldwin and
                  Alan T. Sherman},
  title        = {How we Solved the {\textdollar}100, 000 Decipher Puzzle {(16} Hours
                  too late)},
  journal      = {Cryptologia},
  volume       = {14},
  number       = {3},
  pages        = {258--284},
  year         = {1990},
  url          = {https://doi.org/10.1080/0161-119091864968},
  doi          = {10.1080/0161-119091864968},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/BaldwinS90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/ByrneDK90,
  author       = {John Byrne and
                  Cipher A. Deavours and
                  Louis Kruh},
  title        = {Chaocipher Enters the Computer Age when its Method is disclosed to
                  Cryptologia Editors},
  journal      = {Cryptologia},
  volume       = {14},
  number       = {3},
  pages        = {193--198},
  year         = {1990},
  url          = {https://doi.org/10.1080/0161-119091864896},
  doi          = {10.1080/0161-119091864896},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/ByrneDK90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Connell90,
  author       = {Charles Connell},
  title        = {An Analysis of Newdes: a Modified Version of des},
  journal      = {Cryptologia},
  volume       = {14},
  number       = {3},
  pages        = {217--224},
  year         = {1990},
  url          = {https://doi.org/10.1080/0161-119091864922},
  doi          = {10.1080/0161-119091864922},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Connell90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Deavours90,
  author       = {Cipher A. Deavours},
  title        = {Solution of {C-35} Texts with Partial Key Overlaps},
  journal      = {Cryptologia},
  volume       = {14},
  number       = {2},
  pages        = {162--168},
  year         = {1990},
  url          = {https://doi.org/10.1080/0161-119091864869},
  doi          = {10.1080/0161-119091864869},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Deavours90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/DeavoursK90,
  author       = {Cipher A. Deavours and
                  Louis Kruh},
  title        = {The Swedish {HC-9} Ciphering Machine Challenge},
  journal      = {Cryptologia},
  volume       = {14},
  number       = {2},
  pages        = {139--144},
  year         = {1990},
  url          = {https://doi.org/10.1080/0161-119091864841},
  doi          = {10.1080/0161-119091864841},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/DeavoursK90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/DeavoursK90a,
  author       = {Cipher A. Deavours and
                  Louis Kruh},
  title        = {The Turing Bombe: was {IT} Enough?},
  journal      = {Cryptologia},
  volume       = {14},
  number       = {4},
  pages        = {331--349},
  year         = {1990},
  url          = {https://doi.org/10.1080/0161-119091865002},
  doi          = {10.1080/0161-119091865002},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/DeavoursK90a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/DunniganLB90,
  author       = {Brian Leigh Dunnigan and
                  Frank W. Lewis and
                  Mike Barlow},
  title        = {The Niagara Cipher - Part {I}},
  journal      = {Cryptologia},
  volume       = {14},
  number       = {2},
  pages        = {135--138},
  year         = {1990},
  url          = {https://doi.org/10.1080/0161-119091864832},
  doi          = {10.1080/0161-119091864832},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/DunniganLB90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/DunniganLB90a,
  author       = {Brian Leigh Dunnigan and
                  Frank W. Lewis and
                  Mike Barlow},
  title        = {The Niagara Cipher - Part {II}},
  journal      = {Cryptologia},
  volume       = {14},
  number       = {3},
  pages        = {199--203},
  year         = {1990},
  url          = {https://doi.org/10.1080/0161-119091864904},
  doi          = {10.1080/0161-119091864904},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/DunniganLB90a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Ephron90,
  author       = {Henry D. Ephron},
  title        = {S. I. {S./CB}},
  journal      = {Cryptologia},
  volume       = {14},
  number       = {4},
  pages        = {304--330},
  year         = {1990},
  url          = {https://doi.org/10.1080/0161-119091864995},
  doi          = {10.1080/0161-119091864995},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Ephron90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Foster90,
  author       = {Caxton C. Foster},
  title        = {Vowel Distribution as a Clue to vowel Identification},
  journal      = {Cryptologia},
  volume       = {14},
  number       = {4},
  pages        = {355--362},
  year         = {1990},
  url          = {https://doi.org/10.1080/0161-119091865020},
  doi          = {10.1080/0161-119091865020},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Foster90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Greenough90,
  author       = {H. Paul Greenough},
  title        = {Cryptanalysis of the Uncaged Hagelin},
  journal      = {Cryptologia},
  volume       = {14},
  number       = {2},
  pages        = {145--161},
  year         = {1990},
  url          = {https://doi.org/10.1080/0161-119091864850},
  doi          = {10.1080/0161-119091864850},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Greenough90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Hinsley90,
  author       = {Harry Hinsley},
  title        = {British Intelligence in the Second World War: an Overview},
  journal      = {Cryptologia},
  volume       = {14},
  number       = {1},
  pages        = {1--10},
  year         = {1990},
  url          = {https://doi.org/10.1080/0161-119091864733},
  doi          = {10.1080/0161-119091864733},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Hinsley90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kak90,
  author       = {Subhash C. Kak},
  title        = {The Vararuchi Cipher},
  journal      = {Cryptologia},
  volume       = {14},
  number       = {1},
  pages        = {79--82},
  year         = {1990},
  url          = {https://doi.org/10.1080/0161-119091864797},
  doi          = {10.1080/0161-119091864797},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kak90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kak90a,
  author       = {Subhash C. Kak},
  title        = {Indus and Brahmi Further Connections},
  journal      = {Cryptologia},
  volume       = {14},
  number       = {2},
  pages        = {169--183},
  year         = {1990},
  url          = {https://doi.org/10.1080/0161-119091864878},
  doi          = {10.1080/0161-119091864878},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kak90a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kiele90,
  author       = {William A. Kiele},
  title        = {A Tensor-Theoretic Enhancement to the Hill Cipher System},
  journal      = {Cryptologia},
  volume       = {14},
  number       = {3},
  pages        = {225--233},
  year         = {1990},
  url          = {https://doi.org/10.1080/0161-119091864931},
  doi          = {10.1080/0161-119091864931},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kiele90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kozaczuk90,
  author       = {Wladyslaw Kozaczuk},
  title        = {A New Challenge for an Old Enigma-Buster},
  journal      = {Cryptologia},
  volume       = {14},
  number       = {3},
  pages        = {204--216},
  year         = {1990},
  url          = {https://doi.org/10.1080/0161-119091864913},
  doi          = {10.1080/0161-119091864913},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kozaczuk90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kruh90,
  author       = {Louis Kruh},
  title        = {Reviews and Things Cryptologic},
  journal      = {Cryptologia},
  volume       = {14},
  number       = {1},
  pages        = {83--89},
  year         = {1990},
  url          = {https://doi.org/10.1080/0161-119091864805},
  doi          = {10.1080/0161-119091864805},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kruh90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kruh90a,
  author       = {Louis Kruh},
  title        = {Reviews and Things Cryptologic},
  journal      = {Cryptologia},
  volume       = {14},
  number       = {2},
  pages        = {184--191},
  year         = {1990},
  url          = {https://doi.org/10.1080/0161-119091864887},
  doi          = {10.1080/0161-119091864887},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kruh90a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kruh90b,
  author       = {Louis Kruh},
  title        = {Reviews and Things Cryptologic},
  journal      = {Cryptologia},
  volume       = {14},
  number       = {3},
  pages        = {234--252},
  year         = {1990},
  url          = {https://doi.org/10.1080/0161-119091864940},
  doi          = {10.1080/0161-119091864940},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kruh90b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kruh90c,
  author       = {Louis Kruh},
  title        = {Why was Safford Pessimistic about Breaking the German Enigma Cipher
                  Machine in 1942?},
  journal      = {Cryptologia},
  volume       = {14},
  number       = {3},
  pages        = {253--257},
  year         = {1990},
  url          = {https://doi.org/10.1080/0161-119091864959},
  doi          = {10.1080/0161-119091864959},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kruh90c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kruh90d,
  author       = {Louis Kruh},
  title        = {Reviews and Things Cryptologic},
  journal      = {Cryptologia},
  volume       = {14},
  number       = {4},
  pages        = {363--373},
  year         = {1990},
  url          = {https://doi.org/10.1080/0161-119091865039},
  doi          = {10.1080/0161-119091865039},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kruh90d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Lewis90,
  author       = {Frank W. Lewis},
  title        = {The Day of the Dodo},
  journal      = {Cryptologia},
  volume       = {14},
  number       = {1},
  pages        = {11--27},
  year         = {1990},
  url          = {https://doi.org/10.1080/0161-119091864742},
  doi          = {10.1080/0161-119091864742},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Lewis90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/LipsonA90,
  author       = {Stanley H. Lipson and
                  Francine F. Abeles},
  title        = {The Matrix Cipher of C. L. Dodgson},
  journal      = {Cryptologia},
  volume       = {14},
  number       = {1},
  pages        = {28--36},
  year         = {1990},
  url          = {https://doi.org/10.1080/0161-119091864751},
  doi          = {10.1080/0161-119091864751},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/LipsonA90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/RabsonR90,
  author       = {John Rabson and
                  Hugo Rabson},
  title        = {The War Office {HK} {POW} Cypher System},
  journal      = {Cryptologia},
  volume       = {14},
  number       = {1},
  pages        = {53--60},
  year         = {1990},
  url          = {https://doi.org/10.1080/0161-119091864779},
  doi          = {10.1080/0161-119091864779},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/RabsonR90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Ritter90,
  author       = {Terry Ritter},
  title        = {Substitution Cipher with Pseudo-Random Shuffling: the Dynamic Substitution
                  Combiner},
  journal      = {Cryptologia},
  volume       = {14},
  number       = {4},
  pages        = {289--303},
  year         = {1990},
  url          = {https://doi.org/10.1080/0161-119091864986},
  doi          = {10.1080/0161-119091864986},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Ritter90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Vogel90,
  author       = {Donald S. Vogel},
  title        = {Inside a {KGB} Cipher},
  journal      = {Cryptologia},
  volume       = {14},
  number       = {1},
  pages        = {37--52},
  year         = {1990},
  url          = {https://doi.org/10.1080/0161-119091864760},
  doi          = {10.1080/0161-119091864760},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Vogel90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Weber90,
  author       = {Ralph E. Weber},
  title        = {A Masked Dispatch},
  journal      = {Cryptologia},
  volume       = {14},
  number       = {4},
  pages        = {374--380},
  year         = {1990},
  url          = {https://doi.org/10.1080/0161-119091865048},
  doi          = {10.1080/0161-119091865048},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Weber90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics