Search dblp for Publications

export results for "toc:db/journals/cryptologia/cryptologia32.bht:"

 download as .bib file

@article{DBLP:journals/cryptologia/AdlerFLY08,
  author       = {Jeffrey D. Adler and
                  Ryan W. Fuoss and
                  Michael J. Levin and
                  Amanda R. Youell},
  title        = {Reading Encrypted Diplomatic Correspondence: An Undergraduate Research
                  Project},
  journal      = {Cryptologia},
  volume       = {32},
  number       = {1},
  pages        = {1--12},
  year         = {2008},
  url          = {https://doi.org/10.1080/01611190701498212},
  doi          = {10.1080/01611190701498212},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/AdlerFLY08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Albrecht08,
  author       = {Martin R. Albrecht},
  title        = {Algebraic Attacks on the Courtois Toy Cipher},
  journal      = {Cryptologia},
  volume       = {32},
  number       = {3},
  pages        = {220--276},
  year         = {2008},
  url          = {https://doi.org/10.1080/01611190802058139},
  doi          = {10.1080/01611190802058139},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Albrecht08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Batey08,
  author       = {Mavis Batey},
  title        = {Dilly Knox - {A} Reminiscence of this Pioneer Enigma Cryptanalyst},
  journal      = {Cryptologia},
  volume       = {32},
  number       = {2},
  pages        = {104--130},
  year         = {2008},
  url          = {https://doi.org/10.1080/01611190801914290},
  doi          = {10.1080/01611190801914290},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Batey08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Boklan08,
  author       = {Kent D. Boklan},
  title        = {How {I} Broke an Encrypted Diary from the War of 1812},
  journal      = {Cryptologia},
  volume       = {32},
  number       = {4},
  pages        = {299--310},
  year         = {2008},
  url          = {https://doi.org/10.1080/01611190802232155},
  doi          = {10.1080/01611190802232155},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Boklan08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Buonafalce08,
  author       = {Augusto Buonafalce},
  title        = {Cicco Simonetta's Cipher-Breaking Rules},
  journal      = {Cryptologia},
  volume       = {32},
  number       = {1},
  pages        = {62--70},
  year         = {2008},
  url          = {https://doi.org/10.1080/01611190701756585},
  doi          = {10.1080/01611190701756585},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Buonafalce08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Burke08,
  author       = {Colin B. Burke},
  title        = {From the Archives: The Last Bombe Run, 1955},
  journal      = {Cryptologia},
  volume       = {32},
  number       = {3},
  pages        = {277--278},
  year         = {2008},
  url          = {https://doi.org/10.1080/01611190802113777},
  doi          = {10.1080/01611190802113777},
  timestamp    = {Thu, 03 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Burke08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Bury08,
  author       = {Jan Bury},
  title        = {From the Archives: Intercepting Best Friend?},
  journal      = {Cryptologia},
  volume       = {32},
  number       = {1},
  pages        = {84--87},
  year         = {2008},
  url          = {https://doi.org/10.1080/01611190701743609},
  doi          = {10.1080/01611190701743609},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Bury08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Bury08a,
  author       = {Jan Bury},
  title        = {From the Archives: Inside a Cold War Crypto Cell. Polish Cipher Bureau
                  in the 1980s},
  journal      = {Cryptologia},
  volume       = {32},
  number       = {4},
  pages        = {351--367},
  year         = {2008},
  url          = {https://doi.org/10.1080/01611190802319036},
  doi          = {10.1080/01611190802319036},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Bury08a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Chan08,
  author       = {Wayne S. Chan},
  title        = {Key Enclosed: Examining the Evidence for the Missing Key Letter of
                  the Beale Cipher},
  journal      = {Cryptologia},
  volume       = {32},
  number       = {1},
  pages        = {33--36},
  year         = {2008},
  url          = {https://doi.org/10.1080/01611190701577759},
  doi          = {10.1080/01611190701577759},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Chan08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Christensen08,
  author       = {Chris Christensen},
  title        = {Review of The Collective Works of Captain George P. McGinnis by George
                  P. McGinnis},
  journal      = {Cryptologia},
  volume       = {32},
  number       = {1},
  pages        = {88--89},
  year         = {2008},
  url          = {https://doi.org/10.1080/01611190701743625},
  doi          = {10.1080/01611190701743625},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Christensen08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Christensen08a,
  author       = {Chris Christensen},
  title        = {Review of How to Tell a Secret: Tips, Tricks {\&} Techniques for
                  Breaking Codes {\&} Conveying Covert Information by P. J. Huff
                  and J. G. Lewin},
  journal      = {Cryptologia},
  volume       = {32},
  number       = {1},
  pages        = {90--91},
  year         = {2008},
  url          = {https://doi.org/10.1080/01611190701582460},
  doi          = {10.1080/01611190701582460},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Christensen08a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Christensen08b,
  author       = {Chris Christensen},
  title        = {Review of Voices of the Code Breakers: Personal Accounts of the Secret
                  Heroes of World War Ii by Michael Paterson},
  journal      = {Cryptologia},
  volume       = {32},
  number       = {2},
  pages        = {186--188},
  year         = {2008},
  url          = {https://doi.org/10.1080/01611190701856641},
  doi          = {10.1080/01611190701856641},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Christensen08b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Christensen08c,
  author       = {Chris Christensen},
  title        = {Review of A\({}^{\mbox{3}}\) and His Algebra by Nancy E. Albert},
  journal      = {Cryptologia},
  volume       = {32},
  number       = {2},
  pages        = {189--196},
  year         = {2008},
  url          = {https://doi.org/10.1080/01611190701869461},
  doi          = {10.1080/01611190701869461},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Christensen08c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Christensen08d,
  author       = {Chris Christensen},
  title        = {Review of \emph{The History of Information Security: {A} Comprehensive
                  Handbook} edited by Karl de Leeuw and Jan Bergstra},
  journal      = {Cryptologia},
  volume       = {32},
  number       = {3},
  pages        = {284--294},
  year         = {2008},
  url          = {https://doi.org/10.1080/01611190802125854},
  doi          = {10.1080/01611190802125854},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Christensen08d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/ChristensenG08,
  author       = {Chris Christensen and
                  Suzanne E. Gladfelter},
  title        = {Taking a Cryptology Class to Bletchley Park},
  journal      = {Cryptologia},
  volume       = {32},
  number       = {1},
  pages        = {23--32},
  year         = {2008},
  url          = {https://doi.org/10.1080/01611190701548271},
  doi          = {10.1080/01611190701548271},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/ChristensenG08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Cowan08,
  author       = {Michael J. Cowan},
  title        = {Breaking Short Playfair Ciphers with the Simulated Annealing Algorithm},
  journal      = {Cryptologia},
  volume       = {32},
  number       = {1},
  pages        = {71--83},
  year         = {2008},
  url          = {https://doi.org/10.1080/01611190701743658},
  doi          = {10.1080/01611190701743658},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Cowan08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Diffie08,
  author       = {Whitfield Diffie},
  title        = {What Did We Do Before Biometric Passports? {A} Review of \emph{Who
                  Are You? Identification, Deception, and Surveillance in Early Modern
                  Europe} by Valentin Groebner},
  journal      = {Cryptologia},
  volume       = {32},
  number       = {4},
  pages        = {368--369},
  year         = {2008},
  url          = {https://doi.org/10.1080/01611190802215077},
  doi          = {10.1080/01611190802215077},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Diffie08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Dooley08,
  author       = {John F. Dooley},
  title        = {Reviews of Cryptologic Fiction},
  journal      = {Cryptologia},
  volume       = {32},
  number       = {3},
  pages        = {295--298},
  year         = {2008},
  url          = {https://doi.org/10.1080/01611190802114445},
  doi          = {10.1080/01611190802114445},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Dooley08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Erskine08,
  author       = {Ralph Erskine},
  title        = {Captured \emph{Kriegsmarine} Enigma Documents at Bletchley Park},
  journal      = {Cryptologia},
  volume       = {32},
  number       = {3},
  pages        = {199--219},
  year         = {2008},
  url          = {https://doi.org/10.1080/01611190802088318},
  doi          = {10.1080/01611190802088318},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Erskine08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/EsqX08,
  author       = {Louis Kruh},
  title        = {Review of Figuring It Out At Bletchley Park 1939-1945 by John Gallehawk
                  and Kerry Johnson},
  journal      = {Cryptologia},
  volume       = {32},
  number       = {2},
  pages        = {184--185},
  year         = {2008},
  url          = {https://doi.org/10.1080/01611190801917087},
  doi          = {10.1080/01611190801917087},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/EsqX08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Gallehawk08,
  author       = {John C. Gallehawk},
  title        = {Review of Delusions of Intelligence by R. A. Ratcliff},
  journal      = {Cryptologia},
  volume       = {32},
  number       = {1},
  pages        = {98--100},
  year         = {2008},
  url          = {https://doi.org/10.1080/01611190701758045},
  doi          = {10.1080/01611190701758045},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Gallehawk08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Grajek08,
  author       = {Marek Grajek},
  title        = {Monument \emph{in Memoriam} of Marian Rejewski, Jerzy R{\'{o}}zycki
                  and Henryk Zygalski Unveiled in Poznan},
  journal      = {Cryptologia},
  volume       = {32},
  number       = {2},
  pages        = {101--103},
  year         = {2008},
  url          = {https://doi.org/10.1080/01611190801916634},
  doi          = {10.1080/01611190801916634},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Grajek08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/GreyS08,
  author       = {Christopher Grey and
                  Andrew Sturdy},
  title        = {The 1942 Reorganization of the Government Code and Cypher School},
  journal      = {Cryptologia},
  volume       = {32},
  number       = {4},
  pages        = {311--333},
  year         = {2008},
  url          = {https://doi.org/10.1080/01611190802114411},
  doi          = {10.1080/01611190802114411},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/GreyS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Hatch08,
  author       = {David A. Hatch},
  title        = {From the Archives: Friedman Takes the Stand},
  journal      = {Cryptologia},
  volume       = {32},
  number       = {2},
  pages        = {180--183},
  year         = {2008},
  url          = {https://doi.org/10.1080/01611190801916121},
  doi          = {10.1080/01611190801916121},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Hatch08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Holden08,
  author       = {Joshua Holden},
  title        = {Review of Complexity and Cryptography: An Introduction by John Talbot
                  and Dominic Welsh},
  journal      = {Cryptologia},
  volume       = {32},
  number       = {1},
  pages        = {92--97},
  year         = {2008},
  url          = {https://doi.org/10.1080/01611190701582619},
  doi          = {10.1080/01611190701582619},
  timestamp    = {Mon, 05 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Holden08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Jaworski08,
  author       = {Jerzy Jaworski},
  title        = {Rejewski-R{\'{o}}zycki-Zygalski Lectures in Computer Science},
  journal      = {Cryptologia},
  volume       = {32},
  number       = {4},
  pages        = {348--350},
  year         = {2008},
  url          = {https://doi.org/10.1080/01611190802253128},
  doi          = {10.1080/01611190802253128},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Jaworski08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kahn08,
  author       = {David Kahn},
  title        = {The Future of the Past - Questions in Cryptologic History},
  journal      = {Cryptologia},
  volume       = {32},
  number       = {1},
  pages        = {56--61},
  year         = {2008},
  url          = {https://doi.org/10.1080/01611190701752915},
  doi          = {10.1080/01611190701752915},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kahn08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Massey08,
  author       = {James L. Massey},
  title        = {Review of Series on Arabic Origins of Cryptology},
  journal      = {Cryptologia},
  volume       = {32},
  number       = {3},
  pages        = {280--283},
  year         = {2008},
  url          = {https://doi.org/10.1080/01611190802129104},
  doi          = {10.1080/01611190802129104},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Massey08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Melka08,
  author       = {Tomi S. Melka},
  title        = {Structural Observations Regarding \emph{RongoRongo} Tablet 'Keiti'},
  journal      = {Cryptologia},
  volume       = {32},
  number       = {2},
  pages        = {155--179},
  year         = {2008},
  url          = {https://doi.org/10.1080/01611190801911361},
  doi          = {10.1080/01611190801911361},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Melka08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Parakh08,
  author       = {Abhishek Parakh},
  title        = {Oblivious Transfer Based on Key Exchange},
  journal      = {Cryptologia},
  volume       = {32},
  number       = {1},
  pages        = {37--44},
  year         = {2008},
  url          = {https://doi.org/10.1080/01611190701593228},
  doi          = {10.1080/01611190701593228},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Parakh08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/PhanS08,
  author       = {Raphael Chung{-}Wei Phan and
                  Adi Shamir},
  title        = {Improved Related-key Attacks on Desx and Desx+},
  journal      = {Cryptologia},
  volume       = {32},
  number       = {1},
  pages        = {13--22},
  year         = {2008},
  url          = {https://doi.org/10.1080/01611190701743690},
  doi          = {10.1080/01611190701743690},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/PhanS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Schrodel08,
  author       = {Tobias Schr{\"{o}}del},
  title        = {Breaking Short Vigen{\`{e}}re Ciphers},
  journal      = {Cryptologia},
  volume       = {32},
  number       = {4},
  pages        = {334--347},
  year         = {2008},
  url          = {https://doi.org/10.1080/01611190802336097},
  doi          = {10.1080/01611190802336097},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Schrodel08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/SrikwanJ08,
  author       = {Sukamol Srikwan and
                  Markus Jakobsson},
  title        = {Using Cartoons to Teach Internet Security},
  journal      = {Cryptologia},
  volume       = {32},
  number       = {2},
  pages        = {137--154},
  year         = {2008},
  url          = {https://doi.org/10.1080/01611190701743724},
  doi          = {10.1080/01611190701743724},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/SrikwanJ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Winkel08,
  author       = {Brian J. Winkel},
  title        = {Lessons Learned from a Mathematical Cryptology Course},
  journal      = {Cryptologia},
  volume       = {32},
  number       = {1},
  pages        = {45--55},
  year         = {2008},
  url          = {https://doi.org/10.1080/01611190701489732},
  doi          = {10.1080/01611190701489732},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Winkel08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/X08,
  title        = {Can You Break the Nku Monopoly?},
  journal      = {Cryptologia},
  volume       = {32},
  number       = {2},
  pages        = {197},
  year         = {2008},
  url          = {https://doi.org/10.1080/01611190801920263},
  doi          = {10.1080/01611190801920263},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/X08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/YangC08,
  author       = {Ching{-}Nung Yang and
                  Tse{-}Shih Chen},
  title        = {Security Analysis of Authentication of Images Using Recursive Visual
                  Cryptography},
  journal      = {Cryptologia},
  volume       = {32},
  number       = {2},
  pages        = {131--136},
  year         = {2008},
  url          = {https://doi.org/10.1080/01611190701869669},
  doi          = {10.1080/01611190701869669},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/YangC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics