Search dblp for Publications

export results for "toc:db/journals/cryptologia/cryptologia29.bht:"

 download as .bib file

@article{DBLP:journals/cryptologia/BauerG05,
  author       = {Craig P. Bauer and
                  Suzanne E. Gladfelter},
  title        = {Cryptology in York Pennsylvania},
  journal      = {Cryptologia},
  volume       = {29},
  number       = {2},
  pages        = {159--175},
  year         = {2005},
  url          = {https://doi.org/10.1080/0161-110591893861},
  doi          = {10.1080/0161-110591893861},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/BauerG05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/BauerG05a,
  author       = {Craig P. Bauer and
                  Elliott J. Gottloeb},
  title        = {Results of an Automated Attack on the Running Key Cipher},
  journal      = {Cryptologia},
  volume       = {29},
  number       = {3},
  pages        = {248--254},
  year         = {2005},
  url          = {https://doi.org/10.1080/01611190508951301},
  doi          = {10.1080/01611190508951301},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/BauerG05a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Bruckner05,
  author       = {Hilmar{-}Detlef Br{\"{u}}ckner},
  title        = {Germany's First Cryptanalysis on the Western Front: Decrypting British
                  and French Naval Ciphers in World War {I}},
  journal      = {Cryptologia},
  volume       = {29},
  number       = {1},
  pages        = {1--22},
  year         = {2005},
  url          = {https://doi.org/10.1080/0161-110591893735},
  doi          = {10.1080/0161-110591893735},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Bruckner05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/CooperA05,
  author       = {Rodney H. Cooper and
                  Christopher G. Andrews},
  title        = {The Public Key Covert Channel},
  journal      = {Cryptologia},
  volume       = {29},
  number       = {1},
  pages        = {73--75},
  year         = {2005},
  url          = {https://doi.org/10.1080/0161-110591893780},
  doi          = {10.1080/0161-110591893780},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/CooperA05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/CorderyP05,
  author       = {Robert Cordery and
                  Leon Pintsov},
  title        = {History and Role of Information Security in Postage Evidencing and
                  Payment},
  journal      = {Cryptologia},
  volume       = {29},
  number       = {3},
  pages        = {257--271},
  year         = {2005},
  url          = {https://doi.org/10.1080/01611190508951303},
  doi          = {10.1080/01611190508951303},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/CorderyP05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Dooley05,
  author       = {John F. Dooley},
  title        = {Codes and Ciphers in Fiction: an Overview},
  journal      = {Cryptologia},
  volume       = {29},
  number       = {4},
  pages        = {290--328},
  year         = {2005},
  url          = {https://doi.org/10.1080/0161-110591893898},
  doi          = {10.1080/0161-110591893898},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Dooley05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Gladwin05,
  author       = {Lee A. Gladwin},
  title        = {The Diplomacy of Security: behind the Negotiations of Article 18 of
                  the Sino-american Cooperative Agreement},
  journal      = {Cryptologia},
  volume       = {29},
  number       = {1},
  pages        = {23--42},
  year         = {2005},
  url          = {https://doi.org/10.1080/0161-110591893744},
  doi          = {10.1080/0161-110591893744},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Gladwin05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Ingerman05,
  author       = {Peter Zilahy Ingerman},
  title        = {Two Hebern Cryptographic Machines},
  journal      = {Cryptologia},
  volume       = {29},
  number       = {2},
  pages        = {127--147},
  year         = {2005},
  url          = {https://doi.org/10.1080/0161-110591893843},
  doi          = {10.1080/0161-110591893843},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Ingerman05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Jacobsen05,
  author       = {Philip H. Jacobsen},
  title        = {Pearl Harbor: Radio Officer Leslie Grogan of the Ss Lurline and his
                  Misidentified Signals},
  journal      = {Cryptologia},
  volume       = {29},
  number       = {2},
  pages        = {97--120},
  year         = {2005},
  url          = {https://doi.org/10.1080/0161-110591893825},
  doi          = {10.1080/0161-110591893825},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Jacobsen05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kahn05,
  author       = {David Kahn},
  title        = {The Man in the Iron Mask - Encore Et Enfin, Cryptologically},
  journal      = {Cryptologia},
  volume       = {29},
  number       = {1},
  pages        = {43--49},
  year         = {2005},
  url          = {https://doi.org/10.1080/0161-110591893753},
  doi          = {10.1080/0161-110591893753},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kahn05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kahn05a,
  author       = {David Kahn},
  title        = {From the Archives: Codetalkers not Wanted},
  journal      = {Cryptologia},
  volume       = {29},
  number       = {1},
  pages        = {76--87},
  year         = {2005},
  url          = {https://doi.org/10.1080/0161-110591893799},
  doi          = {10.1080/0161-110591893799},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kahn05a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kahn05b,
  author       = {David Kahn},
  title        = {David Shulman Dies - the Bibliographer of Cryptology},
  journal      = {Cryptologia},
  volume       = {29},
  number       = {1},
  pages        = {94--95},
  year         = {2005},
  url          = {https://doi.org/10.1080/0161-110591893816},
  doi          = {10.1080/0161-110591893816},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kahn05b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kahn05c,
  author       = {David Kahn},
  title        = {The Polish Enigma Conference and some Excursions},
  journal      = {Cryptologia},
  volume       = {29},
  number       = {2},
  pages        = {121--126},
  year         = {2005},
  url          = {https://doi.org/10.1080/0161-110591893834},
  doi          = {10.1080/0161-110591893834},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kahn05c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kahn05d,
  author       = {David Kahn},
  title        = {How Garbles Tickled History},
  journal      = {Cryptologia},
  volume       = {29},
  number       = {4},
  pages        = {329--336},
  year         = {2005},
  url          = {https://doi.org/10.1080/0161-110591893906},
  doi          = {10.1080/0161-110591893906},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kahn05d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kruh05,
  author       = {Louis Kruh},
  title        = {Reviews and Things Cryptologic},
  journal      = {Cryptologia},
  volume       = {29},
  number       = {1},
  pages        = {88--93},
  year         = {2005},
  url          = {https://doi.org/10.1080/0161-110591893807},
  doi          = {10.1080/0161-110591893807},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kruh05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kruh05a,
  author       = {Louis Kruh},
  title        = {Reviews and Things Cryptologic},
  journal      = {Cryptologia},
  volume       = {29},
  number       = {2},
  pages        = {176--187},
  year         = {2005},
  url          = {https://doi.org/10.1080/0161-110591893870},
  doi          = {10.1080/0161-110591893870},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kruh05a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kruh05b,
  author       = {Louis Kruh},
  title        = {Unknown Military Coding Device Can You Identify It?},
  journal      = {Cryptologia},
  volume       = {29},
  number       = {2},
  pages        = {190--191},
  year         = {2005},
  url          = {https://doi.org/10.1080/0161-110591893889},
  doi          = {10.1080/0161-110591893889},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kruh05b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kruh05c,
  author       = {Louis Kruh},
  title        = {Enigma Articles from Cryptologia},
  journal      = {Cryptologia},
  volume       = {29},
  number       = {3},
  pages        = {272--273},
  year         = {2005},
  url          = {https://doi.org/10.1080/01611190508951304},
  doi          = {10.1080/01611190508951304},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kruh05c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kruh05d,
  author       = {Louis Kruh},
  title        = {Crypto User's Guide},
  journal      = {Cryptologia},
  volume       = {29},
  number       = {3},
  pages        = {273},
  year         = {2005},
  url          = {https://doi.org/10.1080/01611190508951305},
  doi          = {10.1080/01611190508951305},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kruh05d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kruh05e,
  author       = {Louis Kruh},
  title        = {Confederate Treasure Issues},
  journal      = {Cryptologia},
  volume       = {29},
  number       = {3},
  pages        = {274},
  year         = {2005},
  url          = {https://doi.org/10.1080/01611190508951306},
  doi          = {10.1080/01611190508951306},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kruh05e.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kruh05f,
  author       = {Louis Kruh},
  title        = {Detective Notebook for Young Adults},
  journal      = {Cryptologia},
  volume       = {29},
  number       = {3},
  pages        = {274--275},
  year         = {2005},
  url          = {https://doi.org/10.1080/01611190508951307},
  doi          = {10.1080/01611190508951307},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kruh05f.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kruh05g,
  author       = {Louis Kruh},
  title        = {College-level Math Crypto Text},
  journal      = {Cryptologia},
  volume       = {29},
  number       = {3},
  pages        = {275},
  year         = {2005},
  url          = {https://doi.org/10.1080/01611190508951308},
  doi          = {10.1080/01611190508951308},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kruh05g.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kruh05h,
  author       = {Louis Kruh},
  title        = {Code Names Post 9/11},
  journal      = {Cryptologia},
  volume       = {29},
  number       = {3},
  pages        = {276},
  year         = {2005},
  url          = {https://doi.org/10.1080/01611190508951309},
  doi          = {10.1080/01611190508951309},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kruh05h.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kruh05i,
  author       = {Louis Kruh},
  title        = {Coral Sea, Midway, and Aleutians Naval Intelligence},
  journal      = {Cryptologia},
  volume       = {29},
  number       = {3},
  pages        = {276--277},
  year         = {2005},
  url          = {https://doi.org/10.1080/01611190508951310},
  doi          = {10.1080/01611190508951310},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kruh05i.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kruh05j,
  author       = {Louis Kruh},
  title        = {Broad View of Power of Mathematics},
  journal      = {Cryptologia},
  volume       = {29},
  number       = {3},
  pages        = {277--278},
  year         = {2005},
  url          = {https://doi.org/10.1080/01611190508951311},
  doi          = {10.1080/01611190508951311},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kruh05j.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kruh05k,
  author       = {Louis Kruh},
  title        = {Friedman Legacy},
  journal      = {Cryptologia},
  volume       = {29},
  number       = {3},
  pages        = {278},
  year         = {2005},
  url          = {https://doi.org/10.1080/01611190508951312},
  doi          = {10.1080/01611190508951312},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kruh05k.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kruh05l,
  author       = {Louis Kruh},
  title        = {Pearl Harbor Revisited},
  journal      = {Cryptologia},
  volume       = {29},
  number       = {3},
  pages        = {278--279},
  year         = {2005},
  url          = {https://doi.org/10.1080/01611190508951313},
  doi          = {10.1080/01611190508951313},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kruh05l.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kruh05m,
  author       = {Louis Kruh},
  title        = {Global Eavesdropping},
  journal      = {Cryptologia},
  volume       = {29},
  number       = {3},
  pages        = {279--280},
  year         = {2005},
  url          = {https://doi.org/10.1080/01611190508951314},
  doi          = {10.1080/01611190508951314},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kruh05m.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kruh05n,
  author       = {Louis Kruh},
  title        = {Cryptology in American History},
  journal      = {Cryptologia},
  volume       = {29},
  number       = {3},
  pages        = {280},
  year         = {2005},
  url          = {https://doi.org/10.1080/01611190508951315},
  doi          = {10.1080/01611190508951315},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kruh05n.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kruh05o,
  author       = {Louis Kruh},
  title        = {Hms Dunedin Acts on Enigma Material},
  journal      = {Cryptologia},
  volume       = {29},
  number       = {3},
  pages        = {280--281},
  year         = {2005},
  url          = {https://doi.org/10.1080/01611190508951316},
  doi          = {10.1080/01611190508951316},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kruh05o.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kruh05p,
  author       = {Louis Kruh},
  title        = {Novel Secrets},
  journal      = {Cryptologia},
  volume       = {29},
  number       = {3},
  pages        = {281--282},
  year         = {2005},
  url          = {https://doi.org/10.1080/01611190508951317},
  doi          = {10.1080/01611190508951317},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kruh05p.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kruh05q,
  author       = {Louis Kruh},
  title        = {Reviews and Things Cryptologic},
  journal      = {Cryptologia},
  volume       = {29},
  number       = {4},
  pages        = {377--380},
  year         = {2005},
  url          = {https://doi.org/10.1080/0161-110591893942},
  doi          = {10.1080/0161-110591893942},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kruh05q.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Lawrence05,
  author       = {John Lawrence},
  title        = {A Study of Rejewski's Equations},
  journal      = {Cryptologia},
  volume       = {29},
  number       = {3},
  pages        = {233--247},
  year         = {2005},
  url          = {https://doi.org/10.1080/01611190508951300},
  doi          = {10.1080/01611190508951300},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Lawrence05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Lawrence05a,
  author       = {John Lawrence},
  title        = {Factoring for the Plugboard - Was Rejewski's Proposed Solution for
                  Breaking the Enigma Feasible?},
  journal      = {Cryptologia},
  volume       = {29},
  number       = {4},
  pages        = {343--366},
  year         = {2005},
  url          = {https://doi.org/10.1080/0161-110591893924},
  doi          = {10.1080/0161-110591893924},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Lawrence05a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/MandhaniK05,
  author       = {Navneet Mandhani and
                  Subhash C. Kak},
  title        = {Watermarking Using Decimal Sequences},
  journal      = {Cryptologia},
  volume       = {29},
  number       = {1},
  pages        = {50--58},
  year         = {2005},
  url          = {https://doi.org/10.1080/0161-110591893762},
  doi          = {10.1080/0161-110591893762},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/MandhaniK05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/OverbeyTW05,
  author       = {Jeffrey Overbey and
                  William N. Traves and
                  Jerzy Wojdylo},
  title        = {On the Keyspace of the Hill Cipher},
  journal      = {Cryptologia},
  volume       = {29},
  number       = {1},
  pages        = {59--72},
  year         = {2005},
  url          = {https://doi.org/10.1080/0161-110591893771},
  doi          = {10.1080/0161-110591893771},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/OverbeyTW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Pekelney05,
  author       = {Richard Pekelney},
  title        = {Excellent, Exceptional, Enormous Crypto Source},
  journal      = {Cryptologia},
  volume       = {29},
  number       = {3},
  pages        = {255--256},
  year         = {2005},
  url          = {https://doi.org/10.1080/01611190508951302},
  doi          = {10.1080/01611190508951302},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Pekelney05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Phan05,
  author       = {Raphael C.{-}W. Phan},
  title        = {How to Explain Block Cipher Cryptanalysis to your Kids},
  journal      = {Cryptologia},
  volume       = {29},
  number       = {2},
  pages        = {148--158},
  year         = {2005},
  url          = {https://doi.org/10.1080/0161-110591893852},
  doi          = {10.1080/0161-110591893852},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Phan05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Rocca05,
  author       = {Charles F. Rocca},
  title        = {Cryptology in General Education},
  journal      = {Cryptologia},
  volume       = {29},
  number       = {4},
  pages        = {337--342},
  year         = {2005},
  url          = {https://doi.org/10.1080/0161-110591893915},
  doi          = {10.1080/0161-110591893915},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Rocca05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/SullivanW05,
  author       = {Geoff Sullivan and
                  Frode Weierud},
  title        = {Breaking German Army Ciphers},
  journal      = {Cryptologia},
  volume       = {29},
  number       = {3},
  pages        = {193--232},
  year         = {2005},
  url          = {https://doi.org/10.1080/01611190508951299},
  doi          = {10.1080/01611190508951299},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/SullivanW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/ThilakaR05,
  author       = {B. Thilaka and
                  K. Rajalakshmi},
  title        = {An Extension of Hill Cipher Using Generalised Inverses and Mth Residue
                  Modulo {N}},
  journal      = {Cryptologia},
  volume       = {29},
  number       = {4},
  pages        = {367--376},
  year         = {2005},
  url          = {https://doi.org/10.1080/0161-110591893933},
  doi          = {10.1080/0161-110591893933},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/ThilakaR05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics