Search dblp for Publications

export results for "toc:db/journals/cryptologia/cryptologia23.bht:"

 download as .bib file

@article{DBLP:journals/cryptologia/Bauer99,
  author       = {Friedrich L. Bauer},
  title        = {An Error in the History of Rotor Encryption Devices},
  journal      = {Cryptologia},
  volume       = {23},
  number       = {3},
  pages        = {206--210},
  year         = {1999},
  url          = {https://doi.org/10.1080/0161-119991887847},
  doi          = {10.1080/0161-119991887847},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Bauer99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Budiansky99,
  author       = {Stephen Budiansky},
  title        = {A Tribute to Cecil Phillips-and Arlington Hall's "Meritocracy"},
  journal      = {Cryptologia},
  volume       = {23},
  number       = {2},
  pages        = {97--107},
  year         = {1999},
  url          = {https://doi.org/10.1080/0161-119991887784},
  doi          = {10.1080/0161-119991887784},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Budiansky99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Davies99,
  author       = {Donald W. Davies},
  title        = {The Bombe a Remarkable Logic Machine},
  journal      = {Cryptologia},
  volume       = {23},
  number       = {2},
  pages        = {108--138},
  year         = {1999},
  url          = {https://doi.org/10.1080/0161-119991887793},
  doi          = {10.1080/0161-119991887793},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Davies99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Davies99a,
  author       = {Donald W. Davies},
  title        = {Effectiveness of the Diagonal Board},
  journal      = {Cryptologia},
  volume       = {23},
  number       = {3},
  pages        = {229--239},
  year         = {1999},
  url          = {https://doi.org/10.1080/0161-119991887865},
  doi          = {10.1080/0161-119991887865},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Davies99a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Ellis99,
  author       = {James H. Ellis},
  title        = {The History of Non-Secret Encryption},
  journal      = {Cryptologia},
  volume       = {23},
  number       = {3},
  pages        = {267--273},
  year         = {1999},
  url          = {https://doi.org/10.1080/0161-119991887919},
  doi          = {10.1080/0161-119991887919},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Ellis99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Erskine99,
  author       = {Ralph Erskine},
  title        = {Kriegsmarine Short Signal Systems - and How Bletchley Park Exploited
                  Them},
  journal      = {Cryptologia},
  volume       = {23},
  number       = {1},
  pages        = {65--92},
  year         = {1999},
  url          = {https://doi.org/10.1080/0161-119991887775},
  doi          = {10.1080/0161-119991887775},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Erskine99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Greenough99,
  author       = {H. Paul Greenough},
  title        = {Cryptanalysis of the Hagelin {C-52} and Similar Machines a Known Plaintext
                  Attack},
  journal      = {Cryptologia},
  volume       = {23},
  number       = {2},
  pages        = {139--156},
  year         = {1999},
  url          = {https://doi.org/10.1080/0161-119991887801},
  doi          = {10.1080/0161-119991887801},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Greenough99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Hagerty99,
  author       = {Alexander Hagerty},
  title        = {An unpublished Yardley Manuscript},
  journal      = {Cryptologia},
  volume       = {23},
  number       = {4},
  pages        = {289--297},
  year         = {1999},
  url          = {https://doi.org/10.1080/0161-119991887946},
  doi          = {10.1080/0161-119991887946},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Hagerty99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kahn99,
  author       = {David Kahn},
  title        = {Students Better than a Pro (Bazeries) and an Author (Candela)},
  journal      = {Cryptologia},
  volume       = {23},
  number       = {1},
  pages        = {63--64},
  year         = {1999},
  url          = {https://doi.org/10.1080/0161-119991887766},
  doi          = {10.1080/0161-119991887766},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kahn99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kruh99,
  author       = {Louis Kruh},
  title        = {Reviews and Things Cryptologic},
  journal      = {Cryptologia},
  volume       = {23},
  number       = {1},
  pages        = {42--54},
  year         = {1999},
  url          = {https://doi.org/10.1080/0161-119991887748},
  doi          = {10.1080/0161-119991887748},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kruh99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kruh99a,
  author       = {Louis Kruh},
  title        = {Reviews and Things Cryptologic},
  journal      = {Cryptologia},
  volume       = {23},
  number       = {2},
  pages        = {171--188},
  year         = {1999},
  url          = {https://doi.org/10.1080/0161-119991887829},
  doi          = {10.1080/0161-119991887829},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kruh99a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kruh99b,
  author       = {Louis Kruh},
  title        = {Vint Hill Farms Station},
  journal      = {Cryptologia},
  volume       = {23},
  number       = {3},
  pages        = {259--260},
  year         = {1999},
  url          = {https://doi.org/10.1080/0161-119991887892},
  doi          = {10.1080/0161-119991887892},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kruh99b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kruh99c,
  author       = {Louis Kruh},
  title        = {Reviews and Things Cryptologic},
  journal      = {Cryptologia},
  volume       = {23},
  number       = {3},
  pages        = {274--286},
  year         = {1999},
  url          = {https://doi.org/10.1080/0161-119991887928},
  doi          = {10.1080/0161-119991887928},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kruh99c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kruh99d,
  author       = {Louis Kruh},
  title        = {Reviews and Things Cryptologic},
  journal      = {Cryptologia},
  volume       = {23},
  number       = {4},
  pages        = {343--352},
  year         = {1999},
  url          = {https://doi.org/10.1080/0161-119991887991},
  doi          = {10.1080/0161-119991887991},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kruh99d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Lomonaco99,
  author       = {Samuel J. Lomonaco},
  title        = {A Quick Glance at Quantum Cryptography},
  journal      = {Cryptologia},
  volume       = {23},
  number       = {1},
  pages        = {1--41},
  year         = {1999},
  url          = {https://doi.org/10.1080/0161-119991887739},
  doi          = {10.1080/0161-119991887739},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Lomonaco99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/McKay99,
  author       = {Craig Graham McKay},
  title        = {Swedish Cryptanalysis and the {SAGA} of Arne Beurling a Book Review},
  journal      = {Cryptologia},
  volume       = {23},
  number       = {3},
  pages        = {257--258},
  year         = {1999},
  url          = {https://doi.org/10.1080/0161-119991887883},
  doi          = {10.1080/0161-119991887883},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/McKay99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Mclean99,
  author       = {Ridley Mclean},
  title        = {Naval Communications},
  journal      = {Cryptologia},
  volume       = {23},
  number       = {4},
  pages        = {353--379},
  year         = {1999},
  url          = {https://doi.org/10.1080/0161-119991888008},
  doi          = {10.1080/0161-119991888008},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Mclean99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Meulen99,
  author       = {Michael van der Meulen},
  title        = {German Air Force Signal Intelligence 1956: a Museum of Comint and
                  {SIGINT}},
  journal      = {Cryptologia},
  volume       = {23},
  number       = {3},
  pages        = {240--256},
  year         = {1999},
  url          = {https://doi.org/10.1080/0161-119991887874},
  doi          = {10.1080/0161-119991887874},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Meulen99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Reeds99,
  author       = {Jim Reeds},
  title        = {Breakthrough in Renaissance Cryptography a Book Review},
  journal      = {Cryptologia},
  volume       = {23},
  number       = {1},
  pages        = {59--62},
  year         = {1999},
  url          = {https://doi.org/10.1080/0161-119991887757},
  doi          = {10.1080/0161-119991887757},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Reeds99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Roch99,
  author       = {Axel Roch},
  title        = {Biopolitics and Intuitive Algebra in the Mathematization of Cryptology?
                  {A} Review of Shannon's "a Mathematical Theory of Cryptography" from
                  1945},
  journal      = {Cryptologia},
  volume       = {23},
  number       = {3},
  pages        = {261--266},
  year         = {1999},
  url          = {https://doi.org/10.1080/0161-119991887900},
  doi          = {10.1080/0161-119991887900},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Roch99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/SavardP99,
  author       = {John J. G. Savard and
                  Richard Pekelney},
  title        = {The {ECM} Mark {II:} Design, History, and Cryptology},
  journal      = {Cryptologia},
  volume       = {23},
  number       = {3},
  pages        = {211--228},
  year         = {1999},
  url          = {https://doi.org/10.1080/0161-119991887856},
  doi          = {10.1080/0161-119991887856},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/SavardP99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Smith99,
  author       = {David M. Smith},
  title        = {The Use of Decrypted German Weather Reports in the Operations of the
                  Fifteenth Air Force over Europe},
  journal      = {Cryptologia},
  volume       = {23},
  number       = {4},
  pages        = {298--304},
  year         = {1999},
  url          = {https://doi.org/10.1080/0161-119991887955},
  doi          = {10.1080/0161-119991887955},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Smith99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/SullivanW99,
  author       = {Geoff Sullivan and
                  Frode Weierud},
  title        = {The Swiss {NEMA} Cipher Machine},
  journal      = {Cryptologia},
  volume       = {23},
  number       = {4},
  pages        = {310--328},
  year         = {1999},
  url          = {https://doi.org/10.1080/0161-119991887973},
  doi          = {10.1080/0161-119991887973},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/SullivanW99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Ulbricht99,
  author       = {Heinz Ulbricht},
  title        = {Enigma-Uhr},
  journal      = {Cryptologia},
  volume       = {23},
  number       = {3},
  pages        = {193--205},
  year         = {1999},
  url          = {https://doi.org/10.1080/0161-119991887838},
  doi          = {10.1080/0161-119991887838},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Ulbricht99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/WalkerW99,
  author       = {Stephen T. Walker and
                  Joan D. Winston},
  title        = {Cryptography Policy Update},
  journal      = {Cryptologia},
  volume       = {23},
  number       = {2},
  pages        = {157--163},
  year         = {1999},
  url          = {https://doi.org/10.1080/0161-119991887810},
  doi          = {10.1080/0161-119991887810},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/WalkerW99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/WalkerW99a,
  author       = {Stephen T. Walker and
                  Joan D. Winston},
  title        = {Cryptography Policy Update},
  journal      = {Cryptologia},
  volume       = {23},
  number       = {4},
  pages        = {329--342},
  year         = {1999},
  url          = {https://doi.org/10.1080/0161-119991887982},
  doi          = {10.1080/0161-119991887982},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/WalkerW99a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Williams99,
  author       = {Robert L. Williams},
  title        = {A Note on the Voynich Manuscript},
  journal      = {Cryptologia},
  volume       = {23},
  number       = {4},
  pages        = {305--309},
  year         = {1999},
  url          = {https://doi.org/10.1080/0161-119991887964},
  doi          = {10.1080/0161-119991887964},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Williams99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics