Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/cryptologia/cryptologia20.bht:"
@article{DBLP:journals/cryptologia/Alvarez96, author = {David {\'{A}}lvarez}, title = {Italian Diplomatic Cryptanalysis in World War {I}}, journal = {Cryptologia}, volume = {20}, number = {1}, pages = {1--10}, year = {1996}, url = {https://doi.org/10.1080/0161-119691884735}, doi = {10.1080/0161-119691884735}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Alvarez96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Alvarez96a, author = {David {\'{A}}lvarez}, title = {Faded Lustre: Vatican Cryptography, 1815-1920}, journal = {Cryptologia}, volume = {20}, number = {2}, pages = {97--131}, year = {1996}, url = {https://doi.org/10.1080/0161-119691884825}, doi = {10.1080/0161-119691884825}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Alvarez96a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Bauer96, author = {Friedrich L. Bauer}, title = {Cryptological Devices and Machines in the Deutsches Museum, Munich}, journal = {Cryptologia}, volume = {20}, number = {1}, pages = {11--13}, year = {1996}, url = {https://doi.org/10.1080/0161-119691884744}, doi = {10.1080/0161-119691884744}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Bauer96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Buonafalce96, author = {Augusto Buonafalce}, title = {The Alberti Exhibition}, journal = {Cryptologia}, volume = {20}, number = {2}, pages = {132--134}, year = {1996}, url = {https://doi.org/10.1080/0161-119691884834}, doi = {10.1080/0161-119691884834}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Buonafalce96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/ClarkDB96, author = {Andrew J. Clark and Ed Dawson and Helen Bergen}, title = {Combinatorial Optimization and the Knapsack Cipher}, journal = {Cryptologia}, volume = {20}, number = {1}, pages = {85--93}, year = {1996}, url = {https://doi.org/10.1080/0161-119691884807}, doi = {10.1080/0161-119691884807}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/ClarkDB96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Currier96, author = {Prescott Currier}, title = {My "Purple" Trip to England in 1941}, journal = {Cryptologia}, volume = {20}, number = {3}, pages = {193--201}, year = {1996}, url = {https://doi.org/10.1080/0161-119691884906}, doi = {10.1080/0161-119691884906}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Currier96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/David96, author = {Charles David}, title = {A World War {II} German Army Field Cipher and How We Broke {IT}}, journal = {Cryptologia}, volume = {20}, number = {1}, pages = {55--76}, year = {1996}, url = {https://doi.org/10.1080/0161-119691884780}, doi = {10.1080/0161-119691884780}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/David96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/DawsonN96, author = {Ed Dawson and Lauren Nielsen}, title = {Automated Cryptanalysis of {XOR} Plaintext Strings}, journal = {Cryptologia}, volume = {20}, number = {2}, pages = {165--181}, year = {1996}, url = {https://doi.org/10.1080/0161-119691884870}, doi = {10.1080/0161-119691884870}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/DawsonN96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Erskine96, author = {Ralph Erskine}, title = {Kriegsmarine Signal Indicators}, journal = {Cryptologia}, volume = {20}, number = {4}, pages = {330--340}, year = {1996}, url = {https://doi.org/10.1080/0161-119691885013}, doi = {10.1080/0161-119691885013}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Erskine96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/GilloglyH96, author = {James J. Gillogly and Larry Harnisch}, title = {Cryptograms from the Crypt}, journal = {Cryptologia}, volume = {20}, number = {4}, pages = {325--329}, year = {1996}, url = {https://doi.org/10.1080/0161-119691885004}, doi = {10.1080/0161-119691885004}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/GilloglyH96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Golomb96, author = {Solomon W. Golomb}, title = {On Factoring Jevons' Number}, journal = {Cryptologia}, volume = {20}, number = {3}, pages = {243--246}, year = {1996}, url = {https://doi.org/10.1080/0161-119691884933}, doi = {10.1080/0161-119691884933}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Golomb96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/HeysT96, author = {Howard M. Heys and Stafford E. Tavares}, title = {Cryptanalysis of Substitution-Permutation Networks Using Key-Dependent Degeneracy}, journal = {Cryptologia}, volume = {20}, number = {3}, pages = {258--274}, year = {1996}, url = {https://doi.org/10.1080/0161-119691884951}, doi = {10.1080/0161-119691884951}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/HeysT96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Hinsley96, author = {Harry Hinsley}, title = {The Counterfactual History of no Ultra}, journal = {Cryptologia}, volume = {20}, number = {4}, pages = {308--324}, year = {1996}, url = {https://doi.org/10.1080/0161-119691884997}, doi = {10.1080/0161-119691884997}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Hinsley96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kahn96, author = {David Kahn}, title = {Some Early Hungarian communist Ciphers}, journal = {Cryptologia}, volume = {20}, number = {4}, pages = {347--358}, year = {1996}, url = {https://doi.org/10.1080/0161-119691885031}, doi = {10.1080/0161-119691885031}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kahn96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kak96, author = {Subhash C. Kak}, title = {An Indus-Sarasvat{\={\i}} Signboard}, journal = {Cryptologia}, volume = {20}, number = {3}, pages = {275--279}, year = {1996}, url = {https://doi.org/10.1080/0161-119691884960}, doi = {10.1080/0161-119691884960}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kak96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kruh96, author = {Louis Kruh}, title = {Reviews and Things Cryptologic}, journal = {Cryptologia}, volume = {20}, number = {1}, pages = {14--36}, year = {1996}, url = {https://doi.org/10.1080/0161-119691884753}, doi = {10.1080/0161-119691884753}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kruh96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kruh96a, author = {Louis Kruh}, title = {Reviews and Things Cryptologic}, journal = {Cryptologia}, volume = {20}, number = {2}, pages = {183--191}, year = {1996}, url = {https://doi.org/10.1080/0161-119691884898}, doi = {10.1080/0161-119691884898}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kruh96a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kruh96b, author = {Louis Kruh}, title = {Reviews and Things Cryptologic}, journal = {Cryptologia}, volume = {20}, number = {3}, pages = {280--288}, year = {1996}, url = {https://doi.org/10.1080/0161-119691884979}, doi = {10.1080/0161-119691884979}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kruh96b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kruh96c, author = {Louis Kruh}, title = {Reviews and Things Cryptologic}, journal = {Cryptologia}, volume = {20}, number = {4}, pages = {365--380}, year = {1996}, url = {https://doi.org/10.1080/0161-119691885059}, doi = {10.1080/0161-119691885059}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kruh96c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Leary96, author = {Thomas Leary}, title = {Cryptology in the 15th and 16th Century}, journal = {Cryptologia}, volume = {20}, number = {3}, pages = {223--242}, year = {1996}, url = {https://doi.org/10.1080/0161-119691884924}, doi = {10.1080/0161-119691884924}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Leary96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/LeightonM96, author = {Albert C. Leighton and Greg E. Mellen}, title = {A Mystery Solved}, journal = {Cryptologia}, volume = {20}, number = {4}, pages = {346}, year = {1996}, url = {https://doi.org/10.1080/0161-119691885022}, doi = {10.1080/0161-119691885022}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/LeightonM96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Mellen96, author = {Greg E. Mellen}, title = {Some Adventures in Cryptoland}, journal = {Cryptologia}, volume = {20}, number = {2}, pages = {155--164}, year = {1996}, url = {https://doi.org/10.1080/0161-119691884861}, doi = {10.1080/0161-119691884861}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Mellen96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Meulen96, author = {Michael van der Meulen}, title = {Werftschl{\"{u}}ssel: {A} German Navy Hand Cipher System Part {II}}, journal = {Cryptologia}, volume = {20}, number = {1}, pages = {37--54}, year = {1996}, url = {https://doi.org/10.1080/0161-119691884771}, doi = {10.1080/0161-119691884771}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Meulen96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Meulen96a, author = {Michael van der Meulen}, title = {Reihenschieber}, journal = {Cryptologia}, volume = {20}, number = {2}, pages = {141--154}, year = {1996}, url = {https://doi.org/10.1080/0161-119691884852}, doi = {10.1080/0161-119691884852}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Meulen96a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Meulen96b, author = {Michael van der Meulen}, title = {Cryptology in the Early Bundesrepublik}, journal = {Cryptologia}, volume = {20}, number = {3}, pages = {202--222}, year = {1996}, url = {https://doi.org/10.1080/0161-119691884915}, doi = {10.1080/0161-119691884915}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Meulen96b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Ratcliff96, author = {Rebecca A. Ratcliff}, title = {Cryptology and World War {II:} NSA's 1995 History Symposium}, journal = {Cryptologia}, volume = {20}, number = {2}, pages = {135--140}, year = {1996}, url = {https://doi.org/10.1080/0161-119691884843}, doi = {10.1080/0161-119691884843}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Ratcliff96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Rubin96, author = {Frank Rubin}, title = {Designing a High-Security Cipher}, journal = {Cryptologia}, volume = {20}, number = {3}, pages = {247--257}, year = {1996}, url = {https://doi.org/10.1080/0161-119691884942}, doi = {10.1080/0161-119691884942}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Rubin96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Rubin96a, author = {Frank Rubin}, title = {One-Time Pad Cryptography}, journal = {Cryptologia}, volume = {20}, number = {4}, pages = {359--364}, year = {1996}, url = {https://doi.org/10.1080/0161-119691885040}, doi = {10.1080/0161-119691885040}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Rubin96a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Schaefer96, author = {Edward F. Schaefer}, title = {A Simplified Data Encryption Standard Algorithm}, journal = {Cryptologia}, volume = {20}, number = {1}, pages = {77--84}, year = {1996}, url = {https://doi.org/10.1080/0161-119691884799}, doi = {10.1080/0161-119691884799}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Schaefer96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Whitehead96, author = {David Whitehead}, title = {Cobra and Other Bombes}, journal = {Cryptologia}, volume = {20}, number = {4}, pages = {289--307}, year = {1996}, url = {https://doi.org/10.1080/0161-119691884988}, doi = {10.1080/0161-119691884988}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Whitehead96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Winkel96, author = {Brian J. Winkel}, title = {Twenty Years and Counting}, journal = {Cryptologia}, volume = {20}, number = {4}, pages = {381}, year = {1996}, url = {https://doi.org/10.1080/0161-119691885068}, doi = {10.1080/0161-119691885068}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Winkel96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.