![](https://dblp1.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp1.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp1.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
default search action
Search dblp for Publications
export results for "toc:db/journals/cryptologia/cryptologia23.bht:"
@article{DBLP:journals/cryptologia/Bauer99, author = {Friedrich L. Bauer}, title = {An Error in the History of Rotor Encryption Devices}, journal = {Cryptologia}, volume = {23}, number = {3}, pages = {206--210}, year = {1999}, url = {https://doi.org/10.1080/0161-119991887847}, doi = {10.1080/0161-119991887847}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Bauer99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Budiansky99, author = {Stephen Budiansky}, title = {A Tribute to Cecil Phillips-and Arlington Hall's "Meritocracy"}, journal = {Cryptologia}, volume = {23}, number = {2}, pages = {97--107}, year = {1999}, url = {https://doi.org/10.1080/0161-119991887784}, doi = {10.1080/0161-119991887784}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Budiansky99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Davies99, author = {Donald W. Davies}, title = {The Bombe a Remarkable Logic Machine}, journal = {Cryptologia}, volume = {23}, number = {2}, pages = {108--138}, year = {1999}, url = {https://doi.org/10.1080/0161-119991887793}, doi = {10.1080/0161-119991887793}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Davies99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Davies99a, author = {Donald W. Davies}, title = {Effectiveness of the Diagonal Board}, journal = {Cryptologia}, volume = {23}, number = {3}, pages = {229--239}, year = {1999}, url = {https://doi.org/10.1080/0161-119991887865}, doi = {10.1080/0161-119991887865}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Davies99a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Ellis99, author = {James H. Ellis}, title = {The History of Non-Secret Encryption}, journal = {Cryptologia}, volume = {23}, number = {3}, pages = {267--273}, year = {1999}, url = {https://doi.org/10.1080/0161-119991887919}, doi = {10.1080/0161-119991887919}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Ellis99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Erskine99, author = {Ralph Erskine}, title = {Kriegsmarine Short Signal Systems - and How Bletchley Park Exploited Them}, journal = {Cryptologia}, volume = {23}, number = {1}, pages = {65--92}, year = {1999}, url = {https://doi.org/10.1080/0161-119991887775}, doi = {10.1080/0161-119991887775}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Erskine99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Greenough99, author = {H. Paul Greenough}, title = {Cryptanalysis of the Hagelin {C-52} and Similar Machines a Known Plaintext Attack}, journal = {Cryptologia}, volume = {23}, number = {2}, pages = {139--156}, year = {1999}, url = {https://doi.org/10.1080/0161-119991887801}, doi = {10.1080/0161-119991887801}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Greenough99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Hagerty99, author = {Alexander Hagerty}, title = {An unpublished Yardley Manuscript}, journal = {Cryptologia}, volume = {23}, number = {4}, pages = {289--297}, year = {1999}, url = {https://doi.org/10.1080/0161-119991887946}, doi = {10.1080/0161-119991887946}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Hagerty99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kahn99, author = {David Kahn}, title = {Students Better than a Pro (Bazeries) and an Author (Candela)}, journal = {Cryptologia}, volume = {23}, number = {1}, pages = {63--64}, year = {1999}, url = {https://doi.org/10.1080/0161-119991887766}, doi = {10.1080/0161-119991887766}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kahn99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kruh99, author = {Louis Kruh}, title = {Reviews and Things Cryptologic}, journal = {Cryptologia}, volume = {23}, number = {1}, pages = {42--54}, year = {1999}, url = {https://doi.org/10.1080/0161-119991887748}, doi = {10.1080/0161-119991887748}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kruh99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kruh99a, author = {Louis Kruh}, title = {Reviews and Things Cryptologic}, journal = {Cryptologia}, volume = {23}, number = {2}, pages = {171--188}, year = {1999}, url = {https://doi.org/10.1080/0161-119991887829}, doi = {10.1080/0161-119991887829}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kruh99a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kruh99b, author = {Louis Kruh}, title = {Vint Hill Farms Station}, journal = {Cryptologia}, volume = {23}, number = {3}, pages = {259--260}, year = {1999}, url = {https://doi.org/10.1080/0161-119991887892}, doi = {10.1080/0161-119991887892}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kruh99b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kruh99c, author = {Louis Kruh}, title = {Reviews and Things Cryptologic}, journal = {Cryptologia}, volume = {23}, number = {3}, pages = {274--286}, year = {1999}, url = {https://doi.org/10.1080/0161-119991887928}, doi = {10.1080/0161-119991887928}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kruh99c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kruh99d, author = {Louis Kruh}, title = {Reviews and Things Cryptologic}, journal = {Cryptologia}, volume = {23}, number = {4}, pages = {343--352}, year = {1999}, url = {https://doi.org/10.1080/0161-119991887991}, doi = {10.1080/0161-119991887991}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kruh99d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Lomonaco99, author = {Samuel J. Lomonaco}, title = {A Quick Glance at Quantum Cryptography}, journal = {Cryptologia}, volume = {23}, number = {1}, pages = {1--41}, year = {1999}, url = {https://doi.org/10.1080/0161-119991887739}, doi = {10.1080/0161-119991887739}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Lomonaco99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/McKay99, author = {Craig Graham McKay}, title = {Swedish Cryptanalysis and the {SAGA} of Arne Beurling a Book Review}, journal = {Cryptologia}, volume = {23}, number = {3}, pages = {257--258}, year = {1999}, url = {https://doi.org/10.1080/0161-119991887883}, doi = {10.1080/0161-119991887883}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/McKay99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Mclean99, author = {Ridley Mclean}, title = {Naval Communications}, journal = {Cryptologia}, volume = {23}, number = {4}, pages = {353--379}, year = {1999}, url = {https://doi.org/10.1080/0161-119991888008}, doi = {10.1080/0161-119991888008}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Mclean99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Meulen99, author = {Michael van der Meulen}, title = {German Air Force Signal Intelligence 1956: a Museum of Comint and {SIGINT}}, journal = {Cryptologia}, volume = {23}, number = {3}, pages = {240--256}, year = {1999}, url = {https://doi.org/10.1080/0161-119991887874}, doi = {10.1080/0161-119991887874}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Meulen99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Reeds99, author = {Jim Reeds}, title = {Breakthrough in Renaissance Cryptography a Book Review}, journal = {Cryptologia}, volume = {23}, number = {1}, pages = {59--62}, year = {1999}, url = {https://doi.org/10.1080/0161-119991887757}, doi = {10.1080/0161-119991887757}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Reeds99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Roch99, author = {Axel Roch}, title = {Biopolitics and Intuitive Algebra in the Mathematization of Cryptology? {A} Review of Shannon's "a Mathematical Theory of Cryptography" from 1945}, journal = {Cryptologia}, volume = {23}, number = {3}, pages = {261--266}, year = {1999}, url = {https://doi.org/10.1080/0161-119991887900}, doi = {10.1080/0161-119991887900}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Roch99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/SavardP99, author = {John J. G. Savard and Richard Pekelney}, title = {The {ECM} Mark {II:} Design, History, and Cryptology}, journal = {Cryptologia}, volume = {23}, number = {3}, pages = {211--228}, year = {1999}, url = {https://doi.org/10.1080/0161-119991887856}, doi = {10.1080/0161-119991887856}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/SavardP99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Smith99, author = {David M. Smith}, title = {The Use of Decrypted German Weather Reports in the Operations of the Fifteenth Air Force over Europe}, journal = {Cryptologia}, volume = {23}, number = {4}, pages = {298--304}, year = {1999}, url = {https://doi.org/10.1080/0161-119991887955}, doi = {10.1080/0161-119991887955}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Smith99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/SullivanW99, author = {Geoff Sullivan and Frode Weierud}, title = {The Swiss {NEMA} Cipher Machine}, journal = {Cryptologia}, volume = {23}, number = {4}, pages = {310--328}, year = {1999}, url = {https://doi.org/10.1080/0161-119991887973}, doi = {10.1080/0161-119991887973}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/SullivanW99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Ulbricht99, author = {Heinz Ulbricht}, title = {Enigma-Uhr}, journal = {Cryptologia}, volume = {23}, number = {3}, pages = {193--205}, year = {1999}, url = {https://doi.org/10.1080/0161-119991887838}, doi = {10.1080/0161-119991887838}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Ulbricht99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/WalkerW99, author = {Stephen T. Walker and Joan D. Winston}, title = {Cryptography Policy Update}, journal = {Cryptologia}, volume = {23}, number = {2}, pages = {157--163}, year = {1999}, url = {https://doi.org/10.1080/0161-119991887810}, doi = {10.1080/0161-119991887810}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/WalkerW99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/WalkerW99a, author = {Stephen T. Walker and Joan D. Winston}, title = {Cryptography Policy Update}, journal = {Cryptologia}, volume = {23}, number = {4}, pages = {329--342}, year = {1999}, url = {https://doi.org/10.1080/0161-119991887982}, doi = {10.1080/0161-119991887982}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/WalkerW99a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Williams99, author = {Robert L. Williams}, title = {A Note on the Voynich Manuscript}, journal = {Cryptologia}, volume = {23}, number = {4}, pages = {305--309}, year = {1999}, url = {https://doi.org/10.1080/0161-119991887964}, doi = {10.1080/0161-119991887964}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Williams99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
![](https://dblp1.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.