Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/cryptologia/cryptologia14.bht:"
@article{DBLP:journals/cryptologia/AbelesL90, author = {Francine F. Abeles and Stanley H. Lipson}, title = {Some Victorian Periodic Polyalphabetic Ciphers}, journal = {Cryptologia}, volume = {14}, number = {2}, pages = {128--134}, year = {1990}, url = {https://doi.org/10.1080/0161-119091864823}, doi = {10.1080/0161-119091864823}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/AbelesL90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Anderson90, author = {Ross J. Anderson}, title = {Solving a Class of Stream Ciphers}, journal = {Cryptologia}, volume = {14}, number = {3}, pages = {285--288}, year = {1990}, url = {https://doi.org/10.1080/0161-119091864977}, doi = {10.1080/0161-119091864977}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Anderson90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/August90, author = {David A. August}, title = {Cryptography and Exploitation of Chinese Manual Cryptosystems Part {II:} the Encrypting Problem}, journal = {Cryptologia}, volume = {14}, number = {1}, pages = {61--78}, year = {1990}, url = {https://doi.org/10.1080/0161-119091864788}, doi = {10.1080/0161-119091864788}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/August90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/BaldwinS90, author = {Robert W. Baldwin and Alan T. Sherman}, title = {How we Solved the {\textdollar}100, 000 Decipher Puzzle {(16} Hours too late)}, journal = {Cryptologia}, volume = {14}, number = {3}, pages = {258--284}, year = {1990}, url = {https://doi.org/10.1080/0161-119091864968}, doi = {10.1080/0161-119091864968}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/BaldwinS90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/ByrneDK90, author = {John Byrne and Cipher A. Deavours and Louis Kruh}, title = {Chaocipher Enters the Computer Age when its Method is disclosed to Cryptologia Editors}, journal = {Cryptologia}, volume = {14}, number = {3}, pages = {193--198}, year = {1990}, url = {https://doi.org/10.1080/0161-119091864896}, doi = {10.1080/0161-119091864896}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/ByrneDK90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Connell90, author = {Charles Connell}, title = {An Analysis of Newdes: a Modified Version of des}, journal = {Cryptologia}, volume = {14}, number = {3}, pages = {217--224}, year = {1990}, url = {https://doi.org/10.1080/0161-119091864922}, doi = {10.1080/0161-119091864922}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Connell90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Deavours90, author = {Cipher A. Deavours}, title = {Solution of {C-35} Texts with Partial Key Overlaps}, journal = {Cryptologia}, volume = {14}, number = {2}, pages = {162--168}, year = {1990}, url = {https://doi.org/10.1080/0161-119091864869}, doi = {10.1080/0161-119091864869}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Deavours90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/DeavoursK90, author = {Cipher A. Deavours and Louis Kruh}, title = {The Swedish {HC-9} Ciphering Machine Challenge}, journal = {Cryptologia}, volume = {14}, number = {2}, pages = {139--144}, year = {1990}, url = {https://doi.org/10.1080/0161-119091864841}, doi = {10.1080/0161-119091864841}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/DeavoursK90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/DeavoursK90a, author = {Cipher A. Deavours and Louis Kruh}, title = {The Turing Bombe: was {IT} Enough?}, journal = {Cryptologia}, volume = {14}, number = {4}, pages = {331--349}, year = {1990}, url = {https://doi.org/10.1080/0161-119091865002}, doi = {10.1080/0161-119091865002}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/DeavoursK90a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/DunniganLB90, author = {Brian Leigh Dunnigan and Frank W. Lewis and Mike Barlow}, title = {The Niagara Cipher - Part {I}}, journal = {Cryptologia}, volume = {14}, number = {2}, pages = {135--138}, year = {1990}, url = {https://doi.org/10.1080/0161-119091864832}, doi = {10.1080/0161-119091864832}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/DunniganLB90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/DunniganLB90a, author = {Brian Leigh Dunnigan and Frank W. Lewis and Mike Barlow}, title = {The Niagara Cipher - Part {II}}, journal = {Cryptologia}, volume = {14}, number = {3}, pages = {199--203}, year = {1990}, url = {https://doi.org/10.1080/0161-119091864904}, doi = {10.1080/0161-119091864904}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/DunniganLB90a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Ephron90, author = {Henry D. Ephron}, title = {S. I. {S./CB}}, journal = {Cryptologia}, volume = {14}, number = {4}, pages = {304--330}, year = {1990}, url = {https://doi.org/10.1080/0161-119091864995}, doi = {10.1080/0161-119091864995}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Ephron90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Foster90, author = {Caxton C. Foster}, title = {Vowel Distribution as a Clue to vowel Identification}, journal = {Cryptologia}, volume = {14}, number = {4}, pages = {355--362}, year = {1990}, url = {https://doi.org/10.1080/0161-119091865020}, doi = {10.1080/0161-119091865020}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Foster90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Greenough90, author = {H. Paul Greenough}, title = {Cryptanalysis of the Uncaged Hagelin}, journal = {Cryptologia}, volume = {14}, number = {2}, pages = {145--161}, year = {1990}, url = {https://doi.org/10.1080/0161-119091864850}, doi = {10.1080/0161-119091864850}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Greenough90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Hinsley90, author = {Harry Hinsley}, title = {British Intelligence in the Second World War: an Overview}, journal = {Cryptologia}, volume = {14}, number = {1}, pages = {1--10}, year = {1990}, url = {https://doi.org/10.1080/0161-119091864733}, doi = {10.1080/0161-119091864733}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Hinsley90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kak90, author = {Subhash C. Kak}, title = {The Vararuchi Cipher}, journal = {Cryptologia}, volume = {14}, number = {1}, pages = {79--82}, year = {1990}, url = {https://doi.org/10.1080/0161-119091864797}, doi = {10.1080/0161-119091864797}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kak90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kak90a, author = {Subhash C. Kak}, title = {Indus and Brahmi Further Connections}, journal = {Cryptologia}, volume = {14}, number = {2}, pages = {169--183}, year = {1990}, url = {https://doi.org/10.1080/0161-119091864878}, doi = {10.1080/0161-119091864878}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kak90a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kiele90, author = {William A. Kiele}, title = {A Tensor-Theoretic Enhancement to the Hill Cipher System}, journal = {Cryptologia}, volume = {14}, number = {3}, pages = {225--233}, year = {1990}, url = {https://doi.org/10.1080/0161-119091864931}, doi = {10.1080/0161-119091864931}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kiele90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kozaczuk90, author = {Wladyslaw Kozaczuk}, title = {A New Challenge for an Old Enigma-Buster}, journal = {Cryptologia}, volume = {14}, number = {3}, pages = {204--216}, year = {1990}, url = {https://doi.org/10.1080/0161-119091864913}, doi = {10.1080/0161-119091864913}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Kozaczuk90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kruh90, author = {Louis Kruh}, title = {Reviews and Things Cryptologic}, journal = {Cryptologia}, volume = {14}, number = {1}, pages = {83--89}, year = {1990}, url = {https://doi.org/10.1080/0161-119091864805}, doi = {10.1080/0161-119091864805}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kruh90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kruh90a, author = {Louis Kruh}, title = {Reviews and Things Cryptologic}, journal = {Cryptologia}, volume = {14}, number = {2}, pages = {184--191}, year = {1990}, url = {https://doi.org/10.1080/0161-119091864887}, doi = {10.1080/0161-119091864887}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kruh90a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kruh90b, author = {Louis Kruh}, title = {Reviews and Things Cryptologic}, journal = {Cryptologia}, volume = {14}, number = {3}, pages = {234--252}, year = {1990}, url = {https://doi.org/10.1080/0161-119091864940}, doi = {10.1080/0161-119091864940}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kruh90b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kruh90c, author = {Louis Kruh}, title = {Why was Safford Pessimistic about Breaking the German Enigma Cipher Machine in 1942?}, journal = {Cryptologia}, volume = {14}, number = {3}, pages = {253--257}, year = {1990}, url = {https://doi.org/10.1080/0161-119091864959}, doi = {10.1080/0161-119091864959}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kruh90c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kruh90d, author = {Louis Kruh}, title = {Reviews and Things Cryptologic}, journal = {Cryptologia}, volume = {14}, number = {4}, pages = {363--373}, year = {1990}, url = {https://doi.org/10.1080/0161-119091865039}, doi = {10.1080/0161-119091865039}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kruh90d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Lewis90, author = {Frank W. Lewis}, title = {The Day of the Dodo}, journal = {Cryptologia}, volume = {14}, number = {1}, pages = {11--27}, year = {1990}, url = {https://doi.org/10.1080/0161-119091864742}, doi = {10.1080/0161-119091864742}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Lewis90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/LipsonA90, author = {Stanley H. Lipson and Francine F. Abeles}, title = {The Matrix Cipher of C. L. Dodgson}, journal = {Cryptologia}, volume = {14}, number = {1}, pages = {28--36}, year = {1990}, url = {https://doi.org/10.1080/0161-119091864751}, doi = {10.1080/0161-119091864751}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/LipsonA90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/RabsonR90, author = {John Rabson and Hugo Rabson}, title = {The War Office {HK} {POW} Cypher System}, journal = {Cryptologia}, volume = {14}, number = {1}, pages = {53--60}, year = {1990}, url = {https://doi.org/10.1080/0161-119091864779}, doi = {10.1080/0161-119091864779}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/RabsonR90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Ritter90, author = {Terry Ritter}, title = {Substitution Cipher with Pseudo-Random Shuffling: the Dynamic Substitution Combiner}, journal = {Cryptologia}, volume = {14}, number = {4}, pages = {289--303}, year = {1990}, url = {https://doi.org/10.1080/0161-119091864986}, doi = {10.1080/0161-119091864986}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Ritter90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Vogel90, author = {Donald S. Vogel}, title = {Inside a {KGB} Cipher}, journal = {Cryptologia}, volume = {14}, number = {1}, pages = {37--52}, year = {1990}, url = {https://doi.org/10.1080/0161-119091864760}, doi = {10.1080/0161-119091864760}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Vogel90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Weber90, author = {Ralph E. Weber}, title = {A Masked Dispatch}, journal = {Cryptologia}, volume = {14}, number = {4}, pages = {374--380}, year = {1990}, url = {https://doi.org/10.1080/0161-119091865048}, doi = {10.1080/0161-119091865048}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Weber90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.