Search dblp for Publications

export results for "toc:db/journals/cryptologia/cryptologia22.bht:"

 download as .bib file

@article{DBLP:journals/cryptologia/Burke98,
  author       = {Colin B. Burke},
  title        = {A Gracious but Tragic Special Ultra Message},
  journal      = {Cryptologia},
  volume       = {22},
  number       = {1},
  pages        = {29--32},
  year         = {1998},
  url          = {https://doi.org/10.1080/0161-119891886759},
  doi          = {10.1080/0161-119891886759},
  timestamp    = {Thu, 03 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Burke98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Coppersmith98,
  author       = {Don Coppersmith},
  title        = {Attacking Four-Round Luby-Rackoff Ciphers},
  journal      = {Cryptologia},
  volume       = {22},
  number       = {3},
  pages        = {266--278},
  year         = {1998},
  url          = {https://doi.org/10.1080/0161-119891886920},
  doi          = {10.1080/0161-119891886920},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Coppersmith98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Ernst98,
  author       = {Thomas Ernst},
  title        = {The Numerical-Astrological Ciphers in the Third Book of Trithemius's
                  Steganographia},
  journal      = {Cryptologia},
  volume       = {22},
  number       = {4},
  pages        = {318--341},
  year         = {1998},
  url          = {https://doi.org/10.1080/0161-119891886957},
  doi          = {10.1080/0161-119891886957},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Ernst98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Hamer98,
  author       = {David Hamer},
  title        = {Letter to the Editors {M2114:} a Naval Enigma},
  journal      = {Cryptologia},
  volume       = {22},
  number       = {3},
  pages        = {230},
  year         = {1998},
  url          = {https://doi.org/10.1080/01611199809350311},
  doi          = {10.1080/01611199809350311},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Hamer98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/HamerSW98,
  author       = {David H. Hamer and
                  Geoff Sullivan and
                  Frode Weierud},
  title        = {Enigma Variations: an Extended Family of Machines},
  journal      = {Cryptologia},
  volume       = {22},
  number       = {3},
  pages        = {211--229},
  year         = {1998},
  url          = {https://doi.org/10.1080/0161-119891886885},
  doi          = {10.1080/0161-119891886885},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/HamerSW98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Heider98,
  author       = {Franz{-}Peter Heider},
  title        = {A Colossal Fish},
  journal      = {Cryptologia},
  volume       = {22},
  number       = {1},
  pages        = {69--95},
  year         = {1998},
  url          = {https://doi.org/10.1080/0161-119891886795},
  doi          = {10.1080/0161-119891886795},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Heider98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kahn98,
  author       = {David Kahn},
  title        = {Soviet Comint in the Cold War},
  journal      = {Cryptologia},
  volume       = {22},
  number       = {1},
  pages        = {1--24},
  year         = {1998},
  url          = {https://doi.org/10.1080/0161-119891886731},
  doi          = {10.1080/0161-119891886731},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kahn98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kelly98,
  author       = {Thomas Kelly},
  title        = {The Myth of the Skytale},
  journal      = {Cryptologia},
  volume       = {22},
  number       = {3},
  pages        = {244--260},
  year         = {1998},
  url          = {https://doi.org/10.1080/0161-119891886902},
  doi          = {10.1080/0161-119891886902},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kelly98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/KourtisM98,
  author       = {Anastasios Kourtis and
                  Charalampos Mantakas},
  title        = {Statistical Distribution of Delta Modulated Speech Signals as a Means
                  for Cryptanalysis in Voice Encryption Systems},
  journal      = {Cryptologia},
  volume       = {22},
  number       = {3},
  pages        = {279--287},
  year         = {1998},
  url          = {https://doi.org/10.1080/0161-119891886939},
  doi          = {10.1080/0161-119891886939},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/KourtisM98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kruh98,
  author       = {Louis Kruh},
  title        = {Reviews and Things Cryptologic},
  journal      = {Cryptologia},
  volume       = {22},
  number       = {1},
  pages        = {49--55},
  year         = {1998},
  url          = {https://doi.org/10.1080/0161-119891886777},
  doi          = {10.1080/0161-119891886777},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kruh98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kruh98a,
  author       = {Louis Kruh},
  title        = {Still Waiting to be Solved: Elgar's 1897 Cipher Message},
  journal      = {Cryptologia},
  volume       = {22},
  number       = {2},
  pages        = {97--98},
  year         = {1998},
  url          = {https://doi.org/10.1080/0161-119891886803},
  doi          = {10.1080/0161-119891886803},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kruh98a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kruh98b,
  author       = {Louis Kruh},
  title        = {Reviews and Things Cryptologic},
  journal      = {Cryptologia},
  volume       = {22},
  number       = {2},
  pages        = {167--191},
  year         = {1998},
  url          = {https://doi.org/10.1080/0161-119891886867},
  doi          = {10.1080/0161-119891886867},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kruh98b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kruh98c,
  author       = {Louis Kruh},
  title        = {Reviews and Things Cryptologic},
  journal      = {Cryptologia},
  volume       = {22},
  number       = {3},
  pages        = {261--265},
  year         = {1998},
  url          = {https://doi.org/10.1080/0161-119891886911},
  doi          = {10.1080/0161-119891886911},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kruh98c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kruh98d,
  author       = {Louis Kruh},
  title        = {Another Herbert O. Yardley Mystery?},
  journal      = {Cryptologia},
  volume       = {22},
  number       = {4},
  pages        = {370--375},
  year         = {1998},
  url          = {https://doi.org/10.1080/0161-119891886984},
  doi          = {10.1080/0161-119891886984},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kruh98d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kruh98e,
  author       = {Louis Kruh},
  title        = {Reviews and Things Cryptologic},
  journal      = {Cryptologia},
  volume       = {22},
  number       = {4},
  pages        = {376--379},
  year         = {1998},
  url          = {https://doi.org/10.1080/0161-119891886993},
  doi          = {10.1080/0161-119891886993},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kruh98e.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Lewis98,
  author       = {Graydon A. Lewis},
  title        = {Setting the Record Straight on Midway},
  journal      = {Cryptologia},
  volume       = {22},
  number       = {2},
  pages        = {99--101},
  year         = {1998},
  url          = {https://doi.org/10.1080/0161-119891886812},
  doi          = {10.1080/0161-119891886812},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Lewis98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/MendelsonWW98,
  author       = {Kenneth A. Mendelson and
                  Stephen T. Walker and
                  Joan D. Winston},
  title        = {The Evolution of Recent Cryptographic Policy in the United States},
  journal      = {Cryptologia},
  volume       = {22},
  number       = {3},
  pages        = {193--210},
  year         = {1998},
  url          = {https://doi.org/10.1080/0161-119891886876},
  doi          = {10.1080/0161-119891886876},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/MendelsonWW98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Meulen98,
  author       = {Michael van der Meulen},
  title        = {A First German Cryptologic Exhibition},
  journal      = {Cryptologia},
  volume       = {22},
  number       = {1},
  pages        = {33--48},
  year         = {1998},
  url          = {https://doi.org/10.1080/0161-119891886768},
  doi          = {10.1080/0161-119891886768},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Meulen98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Meulen98a,
  author       = {Michael van der Meulen},
  title        = {The Road to German Diplomatic Ciphers - 1919 {TO} 1945},
  journal      = {Cryptologia},
  volume       = {22},
  number       = {2},
  pages        = {141--166},
  year         = {1998},
  url          = {https://doi.org/10.1080/0161-119891886858},
  doi          = {10.1080/0161-119891886858},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Meulen98a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/MoldovyanM98,
  author       = {Alexander A. Moldovyan and
                  Nikolay A. Moldovyan},
  title        = {Software Encryption Algorithms for Transparent Protection Technology},
  journal      = {Cryptologia},
  volume       = {22},
  number       = {1},
  pages        = {56--68},
  year         = {1998},
  url          = {https://doi.org/10.1080/0161-119891886786},
  doi          = {10.1080/0161-119891886786},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/MoldovyanM98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/MoldovyanM98a,
  author       = {Alexander A. Moldovyan and
                  Nikolay A. Moldovyan},
  title        = {Flexible Block Cipher with Provably Inequivalent Cryptalgorithm Modifications},
  journal      = {Cryptologia},
  volume       = {22},
  number       = {2},
  pages        = {134--140},
  year         = {1998},
  url          = {https://doi.org/10.1080/0161-119891886849},
  doi          = {10.1080/0161-119891886849},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/MoldovyanM98a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Nichols98,
  author       = {Randall K. Nichols},
  title        = {The Bible Code},
  journal      = {Cryptologia},
  volume       = {22},
  number       = {2},
  pages        = {121--133},
  year         = {1998},
  url          = {https://doi.org/10.1080/0161-119891886830},
  doi          = {10.1080/0161-119891886830},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Nichols98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Oye98,
  author       = {David Schimmelpenninck van der Oye},
  title        = {Tsarist Codebreaking Some Background and Some Examples},
  journal      = {Cryptologia},
  volume       = {22},
  number       = {4},
  pages        = {342--353},
  year         = {1998},
  url          = {https://doi.org/10.1080/0161-119891886966},
  doi          = {10.1080/0161-119891886966},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Oye98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Pfeiffer98,
  author       = {Paul N. Pfeiffer},
  title        = {Breaking the German Weather Ciphers in the Mediterranean Detachment
                  G, 849th Signal Intelligence Service},
  journal      = {Cryptologia},
  volume       = {22},
  number       = {4},
  pages        = {354--369},
  year         = {1998},
  url          = {https://doi.org/10.1080/0161-119891886975},
  doi          = {10.1080/0161-119891886975},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Pfeiffer98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Reeds98,
  author       = {Jim Reeds},
  title        = {Solved: the Ciphers in Book {III} of Trithemius's Steganographia},
  journal      = {Cryptologia},
  volume       = {22},
  number       = {4},
  pages        = {291--317},
  year         = {1998},
  url          = {https://doi.org/10.1080/0161-119891886948},
  doi          = {10.1080/0161-119891886948},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Reeds98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Viterbo98,
  author       = {Emanuele Viterbo},
  title        = {The Ciphered autobiography of a 19th Century Egyptologist},
  journal      = {Cryptologia},
  volume       = {22},
  number       = {3},
  pages        = {231--243},
  year         = {1998},
  url          = {https://doi.org/10.1080/0161-119891886894},
  doi          = {10.1080/0161-119891886894},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Viterbo98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Weierud98,
  author       = {Frode Weierud},
  title        = {Sweden Cryptographic Superpower a Book Review},
  journal      = {Cryptologia},
  volume       = {22},
  number       = {1},
  pages        = {25--28},
  year         = {1998},
  url          = {https://doi.org/10.1080/0161-119891886740},
  doi          = {10.1080/0161-119891886740},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Weierud98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics