Search dblp for Publications

export results for "toc:db/journals/cryptologia/cryptologia1.bht:"

 download as .bib file

@article{DBLP:journals/cryptologia/BrawleyL77,
  author       = {Joel V. Brawley and
                  Jack Levine},
  title        = {Equivalences of Vigenere Systems},
  journal      = {Cryptologia},
  volume       = {1},
  number       = {4},
  pages        = {338--361},
  year         = {1977},
  url          = {https://doi.org/10.1080/0161-117791833101},
  doi          = {10.1080/0161-117791833101},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/BrawleyL77.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Bright77,
  author       = {Herbert S. Bright},
  title        = {Cryptanalytic Attack and Defense: Ciphertext-Only, Known-Plaintext,
                  Chosen-Plaintext},
  journal      = {Cryptologia},
  volume       = {1},
  number       = {4},
  pages        = {366--370},
  year         = {1977},
  url          = {https://doi.org/10.1080/0161-117791833138},
  doi          = {10.1080/0161-117791833138},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Bright77.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Deavours77,
  author       = {Cipher A. Deavours},
  title        = {Unicity Points in Cryptanalysis},
  journal      = {Cryptologia},
  volume       = {1},
  number       = {1},
  pages        = {46--68},
  year         = {1977},
  url          = {https://doi.org/10.1080/0161-117791832797},
  doi          = {10.1080/0161-117791832797},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Deavours77.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Deavours77a,
  author       = {Cipher A. Deavours},
  title        = {Analysis of the Hebern Cryptograph Using Isomorphs},
  journal      = {Cryptologia},
  volume       = {1},
  number       = {2},
  pages        = {167--185},
  year         = {1977},
  url          = {https://doi.org/10.1080/0161-117791832904},
  doi          = {10.1080/0161-117791832904},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Deavours77a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Deavours77b,
  author       = {Cipher A. Deavours},
  title        = {The Kappa Test},
  journal      = {Cryptologia},
  volume       = {1},
  number       = {3},
  pages        = {223--231},
  year         = {1977},
  url          = {https://doi.org/10.1080/0161-117791832959},
  doi          = {10.1080/0161-117791832959},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Deavours77b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Deavours77c,
  author       = {Cipher A. Deavours},
  title        = {Kullback's "Statistical Methods in Cryptanalysis" - Book Review},
  journal      = {Cryptologia},
  volume       = {1},
  number       = {3},
  pages        = {278--280},
  year         = {1977},
  url          = {https://doi.org/10.1080/0161-117791833011},
  doi          = {10.1080/0161-117791833011},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Deavours77c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Deavours77d,
  author       = {Cipher A. Deavours},
  title        = {The {ITHACA} Connection: Computer Cryptography in the Making},
  journal      = {Cryptologia},
  volume       = {1},
  number       = {4},
  pages        = {312--317},
  year         = {1977},
  url          = {https://doi.org/10.1080/0161-117791833057},
  doi          = {10.1080/0161-117791833057},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Deavours77d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/DeavoursR77,
  author       = {Cipher A. Deavours and
                  James A. Reeds},
  title        = {The Enigma Part {I} Historical Perspectives},
  journal      = {Cryptologia},
  volume       = {1},
  number       = {4},
  pages        = {381--391},
  year         = {1977},
  url          = {https://doi.org/10.1080/0161-117791833183},
  doi          = {10.1080/0161-117791833183},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/DeavoursR77.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Eckler77,
  author       = {A. Ross Eckler},
  title        = {A Rapid Yes-No Computer-Aided Communicator},
  journal      = {Cryptologia},
  volume       = {1},
  number       = {4},
  pages        = {326--333},
  year         = {1977},
  url          = {https://doi.org/10.1080/0161-117791833075},
  doi          = {10.1080/0161-117791833075},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Eckler77.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Fagone77,
  author       = {Peter P. Fagone},
  title        = {A Message in Cipher Written by General Cornwallis during the Revolutionary
                  War},
  journal      = {Cryptologia},
  volume       = {1},
  number       = {4},
  pages        = {392--395},
  year         = {1977},
  url          = {https://doi.org/10.1080/0161-117791833192},
  doi          = {10.1080/0161-117791833192},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Fagone77.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Harris77,
  author       = {Barbara Harris},
  title        = {A Different Kind of Column},
  journal      = {Cryptologia},
  volume       = {1},
  number       = {1},
  pages        = {17--19},
  year         = {1977},
  url          = {https://doi.org/10.1080/0161-117791832751},
  doi          = {10.1080/0161-117791832751},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Harris77.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Hiatt77,
  author       = {Blanchard Hiatt},
  title        = {Age of Decipherment},
  journal      = {Cryptologia},
  volume       = {1},
  number       = {2},
  pages        = {101--105},
  year         = {1977},
  url          = {https://doi.org/10.1080/0161-117791832841},
  doi          = {10.1080/0161-117791832841},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Hiatt77.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Hiatt77a,
  author       = {Blanchard Hiatt},
  title        = {"Count Forward Three Score and Ten..."},
  journal      = {Cryptologia},
  volume       = {1},
  number       = {2},
  pages        = {106--115},
  year         = {1977},
  url          = {https://doi.org/10.1080/0161-117791832850},
  doi          = {10.1080/0161-117791832850},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Hiatt77a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Highland77,
  author       = {Harold Joseph Highland},
  title        = {A Simulation Exercise},
  journal      = {Cryptologia},
  volume       = {1},
  number       = {4},
  pages        = {376--377},
  year         = {1977},
  url          = {https://doi.org/10.1080/0161-117791833165},
  doi          = {10.1080/0161-117791833165},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Highland77.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kahn77,
  author       = {David Kahn},
  title        = {The biggest Bibliography},
  journal      = {Cryptologia},
  volume       = {1},
  number       = {1},
  pages        = {27--42},
  year         = {1977},
  url          = {https://doi.org/10.1080/0161-117791832779},
  doi          = {10.1080/0161-117791832779},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kahn77.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kahn77a,
  author       = {David Kahn},
  title        = {"Get Out Your Secret Decoders, Boys and Girls..."},
  journal      = {Cryptologia},
  volume       = {1},
  number       = {2},
  pages        = {166},
  year         = {1977},
  url          = {https://doi.org/10.1080/0161-117791832896},
  doi          = {10.1080/0161-117791832896},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kahn77a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kahn77b,
  author       = {David Kahn},
  title        = {The Significance of Codebreaking and Intelligence in Allied Strategy
                  and Tactics},
  journal      = {Cryptologia},
  volume       = {1},
  number       = {3},
  pages        = {209--222},
  year         = {1977},
  url          = {https://doi.org/10.1080/0161-117791832940},
  doi          = {10.1080/0161-117791832940},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kahn77b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kahn77c,
  author       = {David Kahn},
  title        = {Ecclesiastical Cryptography},
  journal      = {Cryptologia},
  volume       = {1},
  number       = {4},
  pages        = {337},
  year         = {1977},
  url          = {https://doi.org/10.1080/0161-117791833093},
  doi          = {10.1080/0161-117791833093},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kahn77c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kahn77d,
  author       = {David Kahn},
  title        = {Reports from the Reich},
  journal      = {Cryptologia},
  volume       = {1},
  number       = {4},
  pages        = {371},
  year         = {1977},
  url          = {https://doi.org/10.1080/0161-117791833147},
  doi          = {10.1080/0161-117791833147},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kahn77d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kahn77e,
  author       = {David Kahn},
  title        = {German Military Eavesdroppers},
  journal      = {Cryptologia},
  volume       = {1},
  number       = {4},
  pages        = {378--380},
  year         = {1977},
  url          = {https://doi.org/10.1080/0161-117791833174},
  doi          = {10.1080/0161-117791833174},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kahn77e.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kruh77,
  author       = {Louis Kruh},
  title        = {Cipher Equipment},
  journal      = {Cryptologia},
  volume       = {1},
  number       = {1},
  pages        = {69--75},
  year         = {1977},
  url          = {https://doi.org/10.1080/0161-117791832805},
  doi          = {10.1080/0161-117791832805},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kruh77.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kruh77a,
  author       = {Louis Kruh},
  title        = {Cipher Equipment},
  journal      = {Cryptologia},
  volume       = {1},
  number       = {2},
  pages        = {143--149},
  year         = {1977},
  url          = {https://doi.org/10.1080/0161-117791832878},
  doi          = {10.1080/0161-117791832878},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kruh77a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kruh77b,
  author       = {Louis Kruh},
  title        = {Cipher Equipment},
  journal      = {Cryptologia},
  volume       = {1},
  number       = {3},
  pages        = {255--260},
  year         = {1977},
  url          = {https://doi.org/10.1080/0161-117791832986},
  doi          = {10.1080/0161-117791832986},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kruh77b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kruh77c,
  author       = {Louis Kruh},
  title        = {{MA4210} Alphanumeric pocket Cipher},
  journal      = {Cryptologia},
  volume       = {1},
  number       = {4},
  pages        = {334--336},
  year         = {1977},
  url          = {https://doi.org/10.1080/0161-117791833084},
  doi          = {10.1080/0161-117791833084},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kruh77c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kruh77d,
  author       = {Louis Kruh},
  title        = {The Churchyard Ciphers},
  journal      = {Cryptologia},
  volume       = {1},
  number       = {4},
  pages        = {372--375},
  year         = {1977},
  url          = {https://doi.org/10.1080/0161-117791833156},
  doi          = {10.1080/0161-117791833156},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kruh77d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Leighton77,
  author       = {Albert C. Leighton},
  title        = {"the Earliest Use of a Dot Cipher"},
  journal      = {Cryptologia},
  volume       = {1},
  number       = {3},
  pages        = {261--274},
  year         = {1977},
  url          = {https://doi.org/10.1080/0161-117791832995},
  doi          = {10.1080/0161-117791832995},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Leighton77.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/LevineB77,
  author       = {Jack Levine and
                  Joel V. Brawley},
  title        = {Some Cryptographic Applications of Permutation Polynomials},
  journal      = {Cryptologia},
  volume       = {1},
  number       = {1},
  pages        = {76--92},
  year         = {1977},
  url          = {https://doi.org/10.1080/0161-117791832814},
  doi          = {10.1080/0161-117791832814},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/LevineB77.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Marsh77,
  author       = {D. C. B. Marsh},
  title        = {Cryptography at the Colorado School of Mines},
  journal      = {Cryptologia},
  volume       = {1},
  number       = {4},
  pages        = {362--363},
  year         = {1977},
  url          = {https://doi.org/10.1080/0161-117791833110},
  doi          = {10.1080/0161-117791833110},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Marsh77.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/MellenG77,
  author       = {Greg E. Mellen and
                  Lloyd Greenwood},
  title        = {The Cryptology of Multiplex Systems},
  journal      = {Cryptologia},
  volume       = {1},
  number       = {1},
  pages        = {4--16},
  year         = {1977},
  url          = {https://doi.org/10.1080/0161-117791832742},
  doi          = {10.1080/0161-117791832742},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/MellenG77.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/MellenG77a,
  author       = {Greg E. Mellen and
                  Lloyd Greenwood},
  title        = {The Cryptology of Multiplex Systems},
  journal      = {Cryptologia},
  volume       = {1},
  number       = {2},
  pages        = {150--165},
  year         = {1977},
  url          = {https://doi.org/10.1080/0161-117791832887},
  doi          = {10.1080/0161-117791832887},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/MellenG77a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/MorrisSW77,
  author       = {Robert H. Morris Sr. and
                  Neil J. A. Sloane and
                  Aaron D. Wyner},
  title        = {Assessment of the National Bureau of Standards Proposed Federal Data
                  Encryption Standard},
  journal      = {Cryptologia},
  volume       = {1},
  number       = {3},
  pages        = {281--291},
  year         = {1977},
  url          = {https://doi.org/10.1080/0161-117791833020},
  doi          = {10.1080/0161-117791833020},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cryptologia/MorrisSW77.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Penney77,
  author       = {Walter Penney},
  title        = {Grille Reconstruction},
  journal      = {Cryptologia},
  volume       = {1},
  number       = {2},
  pages        = {195--201},
  year         = {1977},
  url          = {https://doi.org/10.1080/0161-117791832922},
  doi          = {10.1080/0161-117791832922},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Penney77.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Reeds77,
  author       = {James A. Reeds},
  title        = {"Cracking" a Random Number Generator},
  journal      = {Cryptologia},
  volume       = {1},
  number       = {1},
  pages        = {20--26},
  year         = {1977},
  url          = {https://doi.org/10.1080/0161-117791832760},
  doi          = {10.1080/0161-117791832760},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Reeds77.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Reeds77a,
  author       = {James A. Reeds},
  title        = {Rotor Algebra},
  journal      = {Cryptologia},
  volume       = {1},
  number       = {2},
  pages        = {186--194},
  year         = {1977},
  url          = {https://doi.org/10.1080/0161-117791832913},
  doi          = {10.1080/0161-117791832913},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Reeds77a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Reeds77b,
  author       = {James A. Reeds},
  title        = {Entropy calculations and Particular Methods of Cryptanalysis},
  journal      = {Cryptologia},
  volume       = {1},
  number       = {3},
  pages        = {235--254},
  year         = {1977},
  url          = {https://doi.org/10.1080/0161-117791832977},
  doi          = {10.1080/0161-117791832977},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Reeds77b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Schatz77,
  author       = {Bruce R. Schatz},
  title        = {Automated Analysis of Cryptograms},
  journal      = {Cryptologia},
  volume       = {1},
  number       = {2},
  pages        = {116--142},
  year         = {1977},
  url          = {https://doi.org/10.1080/0161-117791832869},
  doi          = {10.1080/0161-117791832869},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Schatz77.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Shulman77,
  author       = {David Shulman},
  title        = {A Reply to Kahn's Review},
  journal      = {Cryptologia},
  volume       = {1},
  number       = {1},
  pages        = {43--45},
  year         = {1977},
  url          = {https://doi.org/10.1080/0161-117791832788},
  doi          = {10.1080/0161-117791832788},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Shulman77.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/SimmonsN77,
  author       = {Gustavus J. Simmons and
                  Michael J. Norris},
  title        = {Preliminary Comments on the {M.I.T.} Public-Key Cryptosystem},
  journal      = {Cryptologia},
  volume       = {1},
  number       = {4},
  pages        = {406--414},
  year         = {1977},
  url          = {https://doi.org/10.1080/0161-117791833219},
  doi          = {10.1080/0161-117791833219},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/SimmonsN77.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Straight77,
  author       = {David W. Straight},
  title        = {Cryptanalysis and Data Security Course at the University of Tennessee},
  journal      = {Cryptologia},
  volume       = {1},
  number       = {4},
  pages        = {363--365},
  year         = {1977},
  url          = {https://doi.org/10.1080/0161-117791833129},
  doi          = {10.1080/0161-117791833129},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Straight77.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Winkel77,
  author       = {Brian J. Winkel},
  title        = {Why Cryptologia?},
  journal      = {Cryptologia},
  volume       = {1},
  number       = {1},
  pages        = {1--3},
  year         = {1977},
  url          = {https://doi.org/10.1080/0161-117791832733},
  doi          = {10.1080/0161-117791832733},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Winkel77.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Winkel77a,
  author       = {Brian J. Winkel},
  title        = {Poe Challenge Cipher Finally Broken},
  journal      = {Cryptologia},
  volume       = {1},
  number       = {1},
  pages        = {93--96},
  year         = {1977},
  url          = {https://doi.org/10.1080/0161-117791832823},
  doi          = {10.1080/0161-117791832823},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Winkel77a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Winkel77b,
  author       = {Brian J. Winkel},
  title        = {Word Ways, a Journal Worth Going Your Way},
  journal      = {Cryptologia},
  volume       = {1},
  number       = {3},
  pages        = {232--234},
  year         = {1977},
  url          = {https://doi.org/10.1080/0161-117791832968},
  doi          = {10.1080/0161-117791832968},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Winkel77b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Winkel77c,
  author       = {Brian J. Winkel},
  title        = {There and There},
  journal      = {Cryptologia},
  volume       = {1},
  number       = {4},
  pages        = {396--405},
  year         = {1977},
  url          = {https://doi.org/10.1080/0161-117791833200},
  doi          = {10.1080/0161-117791833200},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Winkel77c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}