default search action
Search dblp for Publications
export results for "toc:db/journals/cryptologia/cryptologia1.bht:"
@article{DBLP:journals/cryptologia/BrawleyL77, author = {Joel V. Brawley and Jack Levine}, title = {Equivalences of Vigenere Systems}, journal = {Cryptologia}, volume = {1}, number = {4}, pages = {338--361}, year = {1977}, url = {https://doi.org/10.1080/0161-117791833101}, doi = {10.1080/0161-117791833101}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/BrawleyL77.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Bright77, author = {Herbert S. Bright}, title = {Cryptanalytic Attack and Defense: Ciphertext-Only, Known-Plaintext, Chosen-Plaintext}, journal = {Cryptologia}, volume = {1}, number = {4}, pages = {366--370}, year = {1977}, url = {https://doi.org/10.1080/0161-117791833138}, doi = {10.1080/0161-117791833138}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Bright77.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Deavours77, author = {Cipher A. Deavours}, title = {Unicity Points in Cryptanalysis}, journal = {Cryptologia}, volume = {1}, number = {1}, pages = {46--68}, year = {1977}, url = {https://doi.org/10.1080/0161-117791832797}, doi = {10.1080/0161-117791832797}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Deavours77.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Deavours77a, author = {Cipher A. Deavours}, title = {Analysis of the Hebern Cryptograph Using Isomorphs}, journal = {Cryptologia}, volume = {1}, number = {2}, pages = {167--185}, year = {1977}, url = {https://doi.org/10.1080/0161-117791832904}, doi = {10.1080/0161-117791832904}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Deavours77a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Deavours77b, author = {Cipher A. Deavours}, title = {The Kappa Test}, journal = {Cryptologia}, volume = {1}, number = {3}, pages = {223--231}, year = {1977}, url = {https://doi.org/10.1080/0161-117791832959}, doi = {10.1080/0161-117791832959}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Deavours77b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Deavours77c, author = {Cipher A. Deavours}, title = {Kullback's "Statistical Methods in Cryptanalysis" - Book Review}, journal = {Cryptologia}, volume = {1}, number = {3}, pages = {278--280}, year = {1977}, url = {https://doi.org/10.1080/0161-117791833011}, doi = {10.1080/0161-117791833011}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Deavours77c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Deavours77d, author = {Cipher A. Deavours}, title = {The {ITHACA} Connection: Computer Cryptography in the Making}, journal = {Cryptologia}, volume = {1}, number = {4}, pages = {312--317}, year = {1977}, url = {https://doi.org/10.1080/0161-117791833057}, doi = {10.1080/0161-117791833057}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Deavours77d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/DeavoursR77, author = {Cipher A. Deavours and James A. Reeds}, title = {The Enigma Part {I} Historical Perspectives}, journal = {Cryptologia}, volume = {1}, number = {4}, pages = {381--391}, year = {1977}, url = {https://doi.org/10.1080/0161-117791833183}, doi = {10.1080/0161-117791833183}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/DeavoursR77.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Eckler77, author = {A. Ross Eckler}, title = {A Rapid Yes-No Computer-Aided Communicator}, journal = {Cryptologia}, volume = {1}, number = {4}, pages = {326--333}, year = {1977}, url = {https://doi.org/10.1080/0161-117791833075}, doi = {10.1080/0161-117791833075}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Eckler77.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Fagone77, author = {Peter P. Fagone}, title = {A Message in Cipher Written by General Cornwallis during the Revolutionary War}, journal = {Cryptologia}, volume = {1}, number = {4}, pages = {392--395}, year = {1977}, url = {https://doi.org/10.1080/0161-117791833192}, doi = {10.1080/0161-117791833192}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Fagone77.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Harris77, author = {Barbara Harris}, title = {A Different Kind of Column}, journal = {Cryptologia}, volume = {1}, number = {1}, pages = {17--19}, year = {1977}, url = {https://doi.org/10.1080/0161-117791832751}, doi = {10.1080/0161-117791832751}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Harris77.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Hiatt77, author = {Blanchard Hiatt}, title = {Age of Decipherment}, journal = {Cryptologia}, volume = {1}, number = {2}, pages = {101--105}, year = {1977}, url = {https://doi.org/10.1080/0161-117791832841}, doi = {10.1080/0161-117791832841}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Hiatt77.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Hiatt77a, author = {Blanchard Hiatt}, title = {"Count Forward Three Score and Ten..."}, journal = {Cryptologia}, volume = {1}, number = {2}, pages = {106--115}, year = {1977}, url = {https://doi.org/10.1080/0161-117791832850}, doi = {10.1080/0161-117791832850}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Hiatt77a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Highland77, author = {Harold Joseph Highland}, title = {A Simulation Exercise}, journal = {Cryptologia}, volume = {1}, number = {4}, pages = {376--377}, year = {1977}, url = {https://doi.org/10.1080/0161-117791833165}, doi = {10.1080/0161-117791833165}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Highland77.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kahn77, author = {David Kahn}, title = {The biggest Bibliography}, journal = {Cryptologia}, volume = {1}, number = {1}, pages = {27--42}, year = {1977}, url = {https://doi.org/10.1080/0161-117791832779}, doi = {10.1080/0161-117791832779}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kahn77.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kahn77a, author = {David Kahn}, title = {"Get Out Your Secret Decoders, Boys and Girls..."}, journal = {Cryptologia}, volume = {1}, number = {2}, pages = {166}, year = {1977}, url = {https://doi.org/10.1080/0161-117791832896}, doi = {10.1080/0161-117791832896}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kahn77a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kahn77b, author = {David Kahn}, title = {The Significance of Codebreaking and Intelligence in Allied Strategy and Tactics}, journal = {Cryptologia}, volume = {1}, number = {3}, pages = {209--222}, year = {1977}, url = {https://doi.org/10.1080/0161-117791832940}, doi = {10.1080/0161-117791832940}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kahn77b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kahn77c, author = {David Kahn}, title = {Ecclesiastical Cryptography}, journal = {Cryptologia}, volume = {1}, number = {4}, pages = {337}, year = {1977}, url = {https://doi.org/10.1080/0161-117791833093}, doi = {10.1080/0161-117791833093}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kahn77c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kahn77d, author = {David Kahn}, title = {Reports from the Reich}, journal = {Cryptologia}, volume = {1}, number = {4}, pages = {371}, year = {1977}, url = {https://doi.org/10.1080/0161-117791833147}, doi = {10.1080/0161-117791833147}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kahn77d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kahn77e, author = {David Kahn}, title = {German Military Eavesdroppers}, journal = {Cryptologia}, volume = {1}, number = {4}, pages = {378--380}, year = {1977}, url = {https://doi.org/10.1080/0161-117791833174}, doi = {10.1080/0161-117791833174}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kahn77e.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kruh77, author = {Louis Kruh}, title = {Cipher Equipment}, journal = {Cryptologia}, volume = {1}, number = {1}, pages = {69--75}, year = {1977}, url = {https://doi.org/10.1080/0161-117791832805}, doi = {10.1080/0161-117791832805}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kruh77.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kruh77a, author = {Louis Kruh}, title = {Cipher Equipment}, journal = {Cryptologia}, volume = {1}, number = {2}, pages = {143--149}, year = {1977}, url = {https://doi.org/10.1080/0161-117791832878}, doi = {10.1080/0161-117791832878}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kruh77a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kruh77b, author = {Louis Kruh}, title = {Cipher Equipment}, journal = {Cryptologia}, volume = {1}, number = {3}, pages = {255--260}, year = {1977}, url = {https://doi.org/10.1080/0161-117791832986}, doi = {10.1080/0161-117791832986}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Kruh77b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kruh77c, author = {Louis Kruh}, title = {{MA4210} Alphanumeric pocket Cipher}, journal = {Cryptologia}, volume = {1}, number = {4}, pages = {334--336}, year = {1977}, url = {https://doi.org/10.1080/0161-117791833084}, doi = {10.1080/0161-117791833084}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kruh77c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kruh77d, author = {Louis Kruh}, title = {The Churchyard Ciphers}, journal = {Cryptologia}, volume = {1}, number = {4}, pages = {372--375}, year = {1977}, url = {https://doi.org/10.1080/0161-117791833156}, doi = {10.1080/0161-117791833156}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kruh77d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Leighton77, author = {Albert C. Leighton}, title = {"the Earliest Use of a Dot Cipher"}, journal = {Cryptologia}, volume = {1}, number = {3}, pages = {261--274}, year = {1977}, url = {https://doi.org/10.1080/0161-117791832995}, doi = {10.1080/0161-117791832995}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Leighton77.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/LevineB77, author = {Jack Levine and Joel V. Brawley}, title = {Some Cryptographic Applications of Permutation Polynomials}, journal = {Cryptologia}, volume = {1}, number = {1}, pages = {76--92}, year = {1977}, url = {https://doi.org/10.1080/0161-117791832814}, doi = {10.1080/0161-117791832814}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/LevineB77.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Marsh77, author = {D. C. B. Marsh}, title = {Cryptography at the Colorado School of Mines}, journal = {Cryptologia}, volume = {1}, number = {4}, pages = {362--363}, year = {1977}, url = {https://doi.org/10.1080/0161-117791833110}, doi = {10.1080/0161-117791833110}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Marsh77.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/MellenG77, author = {Greg E. Mellen and Lloyd Greenwood}, title = {The Cryptology of Multiplex Systems}, journal = {Cryptologia}, volume = {1}, number = {1}, pages = {4--16}, year = {1977}, url = {https://doi.org/10.1080/0161-117791832742}, doi = {10.1080/0161-117791832742}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/MellenG77.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/MellenG77a, author = {Greg E. Mellen and Lloyd Greenwood}, title = {The Cryptology of Multiplex Systems}, journal = {Cryptologia}, volume = {1}, number = {2}, pages = {150--165}, year = {1977}, url = {https://doi.org/10.1080/0161-117791832887}, doi = {10.1080/0161-117791832887}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/MellenG77a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/MorrisSW77, author = {Robert H. Morris Sr. and Neil J. A. Sloane and Aaron D. Wyner}, title = {Assessment of the National Bureau of Standards Proposed Federal Data Encryption Standard}, journal = {Cryptologia}, volume = {1}, number = {3}, pages = {281--291}, year = {1977}, url = {https://doi.org/10.1080/0161-117791833020}, doi = {10.1080/0161-117791833020}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/MorrisSW77.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Penney77, author = {Walter Penney}, title = {Grille Reconstruction}, journal = {Cryptologia}, volume = {1}, number = {2}, pages = {195--201}, year = {1977}, url = {https://doi.org/10.1080/0161-117791832922}, doi = {10.1080/0161-117791832922}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Penney77.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Reeds77, author = {James A. Reeds}, title = {"Cracking" a Random Number Generator}, journal = {Cryptologia}, volume = {1}, number = {1}, pages = {20--26}, year = {1977}, url = {https://doi.org/10.1080/0161-117791832760}, doi = {10.1080/0161-117791832760}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Reeds77.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Reeds77a, author = {James A. Reeds}, title = {Rotor Algebra}, journal = {Cryptologia}, volume = {1}, number = {2}, pages = {186--194}, year = {1977}, url = {https://doi.org/10.1080/0161-117791832913}, doi = {10.1080/0161-117791832913}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Reeds77a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Reeds77b, author = {James A. Reeds}, title = {Entropy calculations and Particular Methods of Cryptanalysis}, journal = {Cryptologia}, volume = {1}, number = {3}, pages = {235--254}, year = {1977}, url = {https://doi.org/10.1080/0161-117791832977}, doi = {10.1080/0161-117791832977}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Reeds77b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Schatz77, author = {Bruce R. Schatz}, title = {Automated Analysis of Cryptograms}, journal = {Cryptologia}, volume = {1}, number = {2}, pages = {116--142}, year = {1977}, url = {https://doi.org/10.1080/0161-117791832869}, doi = {10.1080/0161-117791832869}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Schatz77.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Shulman77, author = {David Shulman}, title = {A Reply to Kahn's Review}, journal = {Cryptologia}, volume = {1}, number = {1}, pages = {43--45}, year = {1977}, url = {https://doi.org/10.1080/0161-117791832788}, doi = {10.1080/0161-117791832788}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Shulman77.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/SimmonsN77, author = {Gustavus J. Simmons and Michael J. Norris}, title = {Preliminary Comments on the {M.I.T.} Public-Key Cryptosystem}, journal = {Cryptologia}, volume = {1}, number = {4}, pages = {406--414}, year = {1977}, url = {https://doi.org/10.1080/0161-117791833219}, doi = {10.1080/0161-117791833219}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/SimmonsN77.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Straight77, author = {David W. Straight}, title = {Cryptanalysis and Data Security Course at the University of Tennessee}, journal = {Cryptologia}, volume = {1}, number = {4}, pages = {363--365}, year = {1977}, url = {https://doi.org/10.1080/0161-117791833129}, doi = {10.1080/0161-117791833129}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Straight77.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Winkel77, author = {Brian J. Winkel}, title = {Why Cryptologia?}, journal = {Cryptologia}, volume = {1}, number = {1}, pages = {1--3}, year = {1977}, url = {https://doi.org/10.1080/0161-117791832733}, doi = {10.1080/0161-117791832733}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Winkel77.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Winkel77a, author = {Brian J. Winkel}, title = {Poe Challenge Cipher Finally Broken}, journal = {Cryptologia}, volume = {1}, number = {1}, pages = {93--96}, year = {1977}, url = {https://doi.org/10.1080/0161-117791832823}, doi = {10.1080/0161-117791832823}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Winkel77a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Winkel77b, author = {Brian J. Winkel}, title = {Word Ways, a Journal Worth Going Your Way}, journal = {Cryptologia}, volume = {1}, number = {3}, pages = {232--234}, year = {1977}, url = {https://doi.org/10.1080/0161-117791832968}, doi = {10.1080/0161-117791832968}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Winkel77b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Winkel77c, author = {Brian J. Winkel}, title = {There and There}, journal = {Cryptologia}, volume = {1}, number = {4}, pages = {396--405}, year = {1977}, url = {https://doi.org/10.1080/0161-117791833200}, doi = {10.1080/0161-117791833200}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Winkel77c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.