Search dblp for Publications

export results for "toc:db/journals/cryptologia/cryptologia40.bht:"

 download as .bib file

@article{DBLP:journals/cryptologia/Bauer16,
  author       = {Craig Bauer},
  title        = {Review of \emph{Unveiling the Mystic Ciphers} by Dave Ramsden},
  journal      = {Cryptologia},
  volume       = {40},
  number       = {4},
  pages        = {399--401},
  year         = {2016},
  url          = {https://doi.org/10.1080/01611194.2016.1159476},
  doi          = {10.1080/01611194.2016.1159476},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Bauer16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/BauerLM16,
  author       = {Craig Bauer and
                  Gregory Link and
                  Dante Molle},
  title        = {James Sanborn's Kryptos and the matrix encryption conjecture},
  journal      = {Cryptologia},
  volume       = {40},
  number       = {6},
  pages        = {541--552},
  year         = {2016},
  url          = {https://doi.org/10.1080/01611194.2016.1141556},
  doi          = {10.1080/01611194.2016.1141556},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/BauerLM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Boklan16,
  author       = {Kent D. Boklan},
  title        = {How {I} deciphered a Robert E. Lee letter - and a note on the power
                  of context in short polyalphabetic ciphers},
  journal      = {Cryptologia},
  volume       = {40},
  number       = {5},
  pages        = {406--410},
  year         = {2016},
  url          = {https://doi.org/10.1080/01611194.2016.1170424},
  doi          = {10.1080/01611194.2016.1170424},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Boklan16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/BonavogliaP16,
  author       = {Paolo Bonavoglia and
                  Consolato Pellegrino},
  title        = {The last poem of Pietro Giannone - finally decrypted},
  journal      = {Cryptologia},
  volume       = {40},
  number       = {5},
  pages        = {411--427},
  year         = {2016},
  url          = {https://doi.org/10.1080/01611194.2015.1087072},
  doi          = {10.1080/01611194.2015.1087072},
  timestamp    = {Mon, 05 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/BonavogliaP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Bury16,
  author       = {Jan Bury},
  title        = {Operation "Zachod": Sex, lies, and ciphers},
  journal      = {Cryptologia},
  volume       = {40},
  number       = {2},
  pages        = {113--140},
  year         = {2016},
  url          = {https://doi.org/10.1080/01611194.2015.1113830},
  doi          = {10.1080/01611194.2015.1113830},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Bury16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Christensen16,
  author       = {Chris Christensen},
  title        = {A review of three books about the women of Bletchley Park},
  journal      = {Cryptologia},
  volume       = {40},
  number       = {5},
  pages        = {469--476},
  year         = {2016},
  url          = {https://doi.org/10.1080/01611194.2016.1159477},
  doi          = {10.1080/01611194.2016.1159477},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Christensen16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Christensen16a,
  author       = {Chris Christensen},
  title        = {Companion review of Prof: Alan Turing Decoded by Dermot Turing},
  journal      = {Cryptologia},
  volume       = {40},
  number       = {6},
  pages        = {556--562},
  year         = {2016},
  url          = {https://doi.org/10.1080/01611194.2016.1236633},
  doi          = {10.1080/01611194.2016.1236633},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Christensen16a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Christensen16b,
  author       = {Chris Christensen},
  title        = {Review of Codes, Ciphers and Spies: Tales of Military Intelligence
                  in World War {I} by John F. Dooley},
  journal      = {Cryptologia},
  volume       = {40},
  number       = {6},
  pages        = {563--566},
  year         = {2016},
  url          = {https://doi.org/10.1080/01611194.2016.1236631},
  doi          = {10.1080/01611194.2016.1236631},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Christensen16b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Christensen16c,
  author       = {Chris Christensen},
  title        = {Review of {U.S.} Navy Codebreakers, Linguists, and Intelligence Officers
                  against Japan, 1910-1941 by Steven E. Maffeo},
  journal      = {Cryptologia},
  volume       = {40},
  number       = {6},
  pages        = {567--569},
  year         = {2016},
  url          = {https://doi.org/10.1080/01611194.2016.1236648},
  doi          = {10.1080/01611194.2016.1236648},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Christensen16c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Dooley16,
  author       = {John F. Dooley},
  title        = {Review of \emph{Prisoners, Lovers, {\&} Spies} by Kristie Macrakis},
  journal      = {Cryptologia},
  volume       = {40},
  number       = {1},
  pages        = {107--112},
  year         = {2016},
  url          = {https://doi.org/10.1080/01611194.2015.1028684},
  doi          = {10.1080/01611194.2015.1028684},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Dooley16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/FuensantaP16,
  author       = {Jos{\'{e}} Ram{\'{o}}n Soler Fuensanta and
                  Vicente Guasch Portas},
  title        = {States by secrecy: Cryptography and guerrillas in the Spanish Civil
                  War},
  journal      = {Cryptologia},
  volume       = {40},
  number       = {2},
  pages        = {203--214},
  year         = {2016},
  url          = {https://doi.org/10.1080/01611194.2015.1028687},
  doi          = {10.1080/01611194.2015.1028687},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/FuensantaP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Girard16,
  author       = {Daniel J. Girard},
  title        = {Breaking "\emph{Tirpitz}": Cryptanalysis of the Japanese-German joint
                  naval cipher},
  journal      = {Cryptologia},
  volume       = {40},
  number       = {5},
  pages        = {428--451},
  year         = {2016},
  url          = {https://doi.org/10.1080/01611194.2015.1087073},
  doi          = {10.1080/01611194.2015.1087073},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Girard16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/GoodmanD16,
  author       = {Michael Goodman and
                  Huw Dylan},
  title        = {British Intelligence and the Fear of a Soviet Attack on Allied Communications},
  journal      = {Cryptologia},
  volume       = {40},
  number       = {1},
  pages        = {15--32},
  year         = {2016},
  url          = {https://doi.org/10.1080/01611194.2015.1028686},
  doi          = {10.1080/01611194.2015.1028686},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/GoodmanD16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Hamer16,
  author       = {David H. Hamer},
  title        = {Review of Prof: Alan Turing Decoded by Dermot Turing},
  journal      = {Cryptologia},
  volume       = {40},
  number       = {6},
  pages        = {553--555},
  year         = {2016},
  url          = {https://doi.org/10.1080/01611194.2016.1236620},
  doi          = {10.1080/01611194.2016.1236620},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Hamer16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Hoffman16,
  author       = {Nick Hoffman},
  title        = {Review of \emph{Intercept: The Secret History of Computers and Spies}
                  by Gordon Corera},
  journal      = {Cryptologia},
  volume       = {40},
  number       = {5},
  pages        = {477--480},
  year         = {2016},
  url          = {https://doi.org/10.1080/01611194.2015.1129186},
  doi          = {10.1080/01611194.2015.1129186},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Hoffman16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/HwangG16,
  author       = {Tzonelih Hwang and
                  Prosanta Gope},
  title        = {{RT-OCFB:} Real-Time Based Optimized Cipher Feedback Mode},
  journal      = {Cryptologia},
  volume       = {40},
  number       = {1},
  pages        = {1--14},
  year         = {2016},
  url          = {https://doi.org/10.1080/01611194.2014.988366},
  doi          = {10.1080/01611194.2014.988366},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/HwangG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/HwangG16a,
  author       = {Tzonelih Hwang and
                  Prosanta Gope},
  title        = {PFC-CTR, {PFC-OCB:} Efficient stream cipher modes of authencryption},
  journal      = {Cryptologia},
  volume       = {40},
  number       = {3},
  pages        = {285--302},
  year         = {2016},
  url          = {https://doi.org/10.1080/01611194.2015.1055386},
  doi          = {10.1080/01611194.2015.1055386},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/HwangG16a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kak16,
  author       = {Subhash C. Kak},
  title        = {Simulating entanglement in classical computing for cryptographic applications},
  journal      = {Cryptologia},
  volume       = {40},
  number       = {4},
  pages        = {348--354},
  year         = {2016},
  url          = {https://doi.org/10.1080/01611194.2015.1084959},
  doi          = {10.1080/01611194.2015.1084959},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kak16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/KepleyRS16,
  author       = {Shane Kepley and
                  David Russo and
                  Rainer Steinwandt},
  title        = {Cryptanalysis of a modern rotor machine in a multicast setting},
  journal      = {Cryptologia},
  volume       = {40},
  number       = {6},
  pages        = {515--521},
  year         = {2016},
  url          = {https://doi.org/10.1080/01611194.2015.1115443},
  doi          = {10.1080/01611194.2015.1115443},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/KepleyRS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kollar16,
  author       = {Jozef Koll{\'{a}}r},
  title        = {Soviet {VIC} Cipher: No Respector of Kerckoff's Principles},
  journal      = {Cryptologia},
  volume       = {40},
  number       = {1},
  pages        = {33--48},
  year         = {2016},
  url          = {https://doi.org/10.1080/01611194.2015.1028679},
  doi          = {10.1080/01611194.2015.1028679},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kollar16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/LasryKW16,
  author       = {George Lasry and
                  Nils Kopal and
                  Arno Wacker},
  title        = {Automated Known-Plaintext Cryptanalysis of Short Hagelin {M-209} Messages},
  journal      = {Cryptologia},
  volume       = {40},
  number       = {1},
  pages        = {49--69},
  year         = {2016},
  url          = {https://doi.org/10.1080/01611194.2014.988370},
  doi          = {10.1080/01611194.2014.988370},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/LasryKW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/LasryKW16a,
  author       = {George Lasry and
                  Nils Kopal and
                  Arno Wacker},
  title        = {Ciphertext-only cryptanalysis of Hagelin {M-209} pins and lugs},
  journal      = {Cryptologia},
  volume       = {40},
  number       = {2},
  pages        = {141--176},
  year         = {2016},
  url          = {https://doi.org/10.1080/01611194.2015.1028683},
  doi          = {10.1080/01611194.2015.1028683},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/LasryKW16a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/LasryKW16b,
  author       = {George Lasry and
                  Nils Kopal and
                  Arno Wacker},
  title        = {Cryptanalysis of columnar transposition cipher with long keys},
  journal      = {Cryptologia},
  volume       = {40},
  number       = {4},
  pages        = {374--398},
  year         = {2016},
  url          = {https://doi.org/10.1080/01611194.2015.1087074},
  doi          = {10.1080/01611194.2015.1087074},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/LasryKW16b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/LasryRKW16,
  author       = {George Lasry and
                  Moshe Rubin and
                  Nils Kopal and
                  Arno Wacker},
  title        = {Cryptanalysis of Chaocipher and solution of Exhibit 6},
  journal      = {Cryptologia},
  volume       = {40},
  number       = {6},
  pages        = {487--514},
  year         = {2016},
  url          = {https://doi.org/10.1080/01611194.2015.1091797},
  doi          = {10.1080/01611194.2015.1091797},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/LasryRKW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/LeapMNS16,
  author       = {Tom Leap and
                  Tim McDevitt and
                  Kayla Novak and
                  Nicolette Siermine},
  title        = {Further improvements to the Bauer-Millward attack on the Hill cipher},
  journal      = {Cryptologia},
  volume       = {40},
  number       = {5},
  pages        = {452--468},
  year         = {2016},
  url          = {https://doi.org/10.1080/01611194.2015.1087075},
  doi          = {10.1080/01611194.2015.1087075},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/LeapMNS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/LoebenbergerN16,
  author       = {Daniel Loebenberger and
                  Michael N{\"{u}}sken},
  title        = {Design principles of DES-like ciphers: {A} historical overview},
  journal      = {Cryptologia},
  volume       = {40},
  number       = {3},
  pages        = {221--239},
  year         = {2016},
  url          = {https://doi.org/10.1080/01611194.2015.1028681},
  doi          = {10.1080/01611194.2015.1028681},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/LoebenbergerN16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Narvaez16,
  author       = {Roberto Narv{\'{a}}ez},
  title        = {On the cryptography of James Leander Cathcart {(1767-1843)}},
  journal      = {Cryptologia},
  volume       = {40},
  number       = {4},
  pages        = {316--326},
  year         = {2016},
  url          = {https://doi.org/10.1080/01611194.2015.1055388},
  doi          = {10.1080/01611194.2015.1055388},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Narvaez16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/OstwaldW16,
  author       = {Olaf Ostwald and
                  Frode Weierud},
  title        = {History and Modern Cryptanalysis of Enigma's Pluggable Reflector},
  journal      = {Cryptologia},
  volume       = {40},
  number       = {1},
  pages        = {70--91},
  year         = {2016},
  url          = {https://doi.org/10.1080/01611194.2015.1028682},
  doi          = {10.1080/01611194.2015.1028682},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/OstwaldW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Pommerening16,
  author       = {Klaus Pommerening},
  title        = {Cryptanalysis of nonlinear feedback shift registers},
  journal      = {Cryptologia},
  volume       = {40},
  number       = {4},
  pages        = {303--315},
  year         = {2016},
  url          = {https://doi.org/10.1080/01611194.2015.1055385},
  doi          = {10.1080/01611194.2015.1055385},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Pommerening16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Samuels16,
  author       = {Martin Samuels},
  title        = {Ludwig F{\"{o}}ppl: {A} Bavarian cryptanalyst on the Western
                  front},
  journal      = {Cryptologia},
  volume       = {40},
  number       = {4},
  pages        = {355--373},
  year         = {2016},
  url          = {https://doi.org/10.1080/01611194.2015.1084960},
  doi          = {10.1080/01611194.2015.1084960},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Samuels16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/SanguinoLPEN16,
  author       = {Luis Alberto Benthin Sanguino and
                  Gregor Leander and
                  Christof Paar and
                  Bernhard Esslinger and
                  Ingo Niebel},
  title        = {Analyzing the Spanish strip cipher by combining combinatorial and
                  statistical methods},
  journal      = {Cryptologia},
  volume       = {40},
  number       = {3},
  pages        = {261--284},
  year         = {2016},
  url          = {https://doi.org/10.1080/01611194.2015.1050332},
  doi          = {10.1080/01611194.2015.1050332},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/SanguinoLPEN16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Smoot16,
  author       = {Betsy Rohaly Smoot},
  title        = {Call for papers: 2017 Symposium on Cryptologic History},
  journal      = {Cryptologia},
  volume       = {40},
  number       = {5},
  pages        = {484--485},
  year         = {2016},
  url          = {https://doi.org/10.1080/01611194.2016.1199447},
  doi          = {10.1080/01611194.2016.1199447},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Smoot16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/SmootH16,
  author       = {Betsy Rohaly Smoot and
                  David A. Hatch},
  title        = {Ann Zeilinger Caracristi {(1} February 1921-10 January 2016)},
  journal      = {Cryptologia},
  volume       = {40},
  number       = {5},
  pages        = {403--405},
  year         = {2016},
  url          = {https://doi.org/10.1080/01611194.2016.1169459},
  doi          = {10.1080/01611194.2016.1169459},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/SmootH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Strasser16,
  author       = {Gerhard F. Strasser},
  title        = {Samuel Zimmermann's \emph{Gehaimnussen}: The earliest cryptological
                  book in German},
  journal      = {Cryptologia},
  volume       = {40},
  number       = {3},
  pages        = {240--260},
  year         = {2016},
  url          = {https://doi.org/10.1080/01611194.2015.1093898},
  doi          = {10.1080/01611194.2015.1093898},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Strasser16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Thimbleby16,
  author       = {Harold Thimbleby},
  title        = {Human factors and missed solutions to Enigma design weaknesses},
  journal      = {Cryptologia},
  volume       = {40},
  number       = {2},
  pages        = {177--202},
  year         = {2016},
  url          = {https://doi.org/10.1080/01611194.2015.1028680},
  doi          = {10.1080/01611194.2015.1028680},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Thimbleby16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Visco16,
  author       = {David Visco},
  title        = {Somerton Man times two},
  journal      = {Cryptologia},
  volume       = {40},
  number       = {5},
  pages        = {481--483},
  year         = {2016},
  url          = {https://doi.org/10.1080/01611194.2015.1135649},
  doi          = {10.1080/01611194.2015.1135649},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Visco16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Wik16,
  author       = {Anders Wik},
  title        = {Enigma {Z30} retrieved},
  journal      = {Cryptologia},
  volume       = {40},
  number       = {3},
  pages        = {215--220},
  year         = {2016},
  url          = {https://doi.org/10.1080/01611194.2015.1055387},
  doi          = {10.1080/01611194.2015.1055387},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Wik16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Wright16,
  author       = {John Wright},
  title        = {Rejewski's Test Message as a Crib},
  journal      = {Cryptologia},
  volume       = {40},
  number       = {1},
  pages        = {92--106},
  year         = {2016},
  url          = {https://doi.org/10.1080/01611194.2015.1028685},
  doi          = {10.1080/01611194.2015.1028685},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Wright16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Wright16a,
  author       = {John Wright},
  title        = {A recursive solution for Turing's {H-M} factor},
  journal      = {Cryptologia},
  volume       = {40},
  number       = {4},
  pages        = {327--347},
  year         = {2016},
  url          = {https://doi.org/10.1080/01611194.2015.1062318},
  doi          = {10.1080/01611194.2015.1062318},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Wright16a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/YuZ16,
  author       = {Qian Yu and
                  Chang N. Zhang},
  title        = {A new and fast cryptographic hash function based on {RC4}},
  journal      = {Cryptologia},
  volume       = {40},
  number       = {6},
  pages        = {522--540},
  year         = {2016},
  url          = {https://doi.org/10.1080/01611194.2015.1135486},
  doi          = {10.1080/01611194.2015.1135486},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/YuZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics