Search dblp for Publications

export results for "toc:db/journals/cryptologia/cryptologia3.bht:"

 download as .bib file

@article{DBLP:journals/cryptologia/Arnold79,
  author       = {Philip M. Arnold},
  title        = {Ciphers for the Educated Man},
  journal      = {Cryptologia},
  volume       = {3},
  number       = {4},
  pages        = {215--216},
  year         = {1979},
  url          = {https://doi.org/10.1080/0161-117991854098},
  doi          = {10.1080/0161-117991854098},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Arnold79.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Arnold79a,
  author       = {Philip M. Arnold},
  title        = {A German Code Book},
  journal      = {Cryptologia},
  volume       = {3},
  number       = {4},
  pages        = {243--245},
  year         = {1979},
  url          = {https://doi.org/10.1080/0161-117991854160},
  doi          = {10.1080/0161-117991854160},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Arnold79a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/BlakleyB79,
  author       = {Bob Blakley and
                  G. R. Blakley},
  title        = {Security of Number Theoretic Public Key Cryptosystems against Random
                  Attack, {II}},
  journal      = {Cryptologia},
  volume       = {3},
  number       = {1},
  pages        = {29--42},
  year         = {1979},
  url          = {https://doi.org/10.1080/0161-117991853774},
  doi          = {10.1080/0161-117991853774},
  timestamp    = {Thu, 09 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/BlakleyB79.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/BlakleyB79a,
  author       = {Bob Blakley and
                  G. R. Blakley},
  title        = {Security of Number Theoretic Public Key Cryptosystems against Random
                  Attack, {III}},
  journal      = {Cryptologia},
  volume       = {3},
  number       = {2},
  pages        = {105--118},
  year         = {1979},
  url          = {https://doi.org/10.1080/0161-117991853909},
  doi          = {10.1080/0161-117991853909},
  timestamp    = {Thu, 09 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/BlakleyB79a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Fischer79,
  author       = {Elliot Fischer},
  title        = {Language Redundancy and Cryptanalysis},
  journal      = {Cryptologia},
  volume       = {3},
  number       = {4},
  pages        = {233--235},
  year         = {1979},
  url          = {https://doi.org/10.1080/0161-117991854133},
  doi          = {10.1080/0161-117991854133},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Fischer79.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Good79,
  author       = {I. J. Good},
  title        = {Early Work on Computers at Bletchley},
  journal      = {Cryptologia},
  volume       = {3},
  number       = {2},
  pages        = {65--77},
  year         = {1979},
  url          = {https://doi.org/10.1080/0161-117991853855},
  doi          = {10.1080/0161-117991853855},
  timestamp    = {Thu, 11 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Good79.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Hammer79,
  author       = {Carl Hammer},
  title        = {How did {TJB} Encode B2?},
  journal      = {Cryptologia},
  volume       = {3},
  number       = {1},
  pages        = {9--15},
  year         = {1979},
  url          = {https://doi.org/10.1080/0161-117991853747},
  doi          = {10.1080/0161-117991853747},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Hammer79.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Hardie79,
  author       = {Bradford Hardie},
  title        = {Book Review},
  journal      = {Cryptologia},
  volume       = {3},
  number       = {2},
  pages        = {122--126},
  year         = {1979},
  url          = {https://doi.org/10.1080/0161-117991853936},
  doi          = {10.1080/0161-117991853936},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Hardie79.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Hardie79a,
  author       = {Bradford Hardie},
  title        = {A Theory of Cryptography},
  journal      = {Cryptologia},
  volume       = {3},
  number       = {4},
  pages        = {246--247},
  year         = {1979},
  url          = {https://doi.org/10.1080/0161-117991854179},
  doi          = {10.1080/0161-117991854179},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Hardie79a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Inman79,
  author       = {Bobby R. Inman},
  title        = {The {NSA} Perspective on Telecommunications Protection in the Nongovernmental
                  Sector},
  journal      = {Cryptologia},
  volume       = {3},
  number       = {3},
  pages        = {129--135},
  year         = {1979},
  url          = {https://doi.org/10.1080/0161-117991853954},
  doi          = {10.1080/0161-117991853954},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Inman79.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kahn79,
  author       = {David Kahn},
  title        = {The Ultra Conference},
  journal      = {Cryptologia},
  volume       = {3},
  number       = {1},
  pages        = {1--8},
  year         = {1979},
  url          = {https://doi.org/10.1080/0161-117991853738},
  doi          = {10.1080/0161-117991853738},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kahn79.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kahn79a,
  author       = {David Kahn},
  title        = {American Codes: a Book Review},
  journal      = {Cryptologia},
  volume       = {3},
  number       = {2},
  pages        = {96--99},
  year         = {1979},
  url          = {https://doi.org/10.1080/0161-117991853882},
  doi          = {10.1080/0161-117991853882},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kahn79a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kahn79b,
  author       = {David Kahn},
  title        = {A German Consular Cipher},
  journal      = {Cryptologia},
  volume       = {3},
  number       = {2},
  pages        = {119},
  year         = {1979},
  url          = {https://doi.org/10.1080/0161-117991853918},
  doi          = {10.1080/0161-117991853918},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kahn79b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kahn79c,
  author       = {David Kahn},
  title        = {The Futility of It All},
  journal      = {Cryptologia},
  volume       = {3},
  number       = {3},
  pages        = {158--165},
  year         = {1979},
  url          = {https://doi.org/10.1080/0161-117991853981},
  doi          = {10.1080/0161-117991853981},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kahn79c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kahn79d,
  author       = {David Kahn},
  title        = {The Geheimschreiber},
  journal      = {Cryptologia},
  volume       = {3},
  number       = {4},
  pages        = {210--214},
  year         = {1979},
  url          = {https://doi.org/10.1080/0161-117991854089},
  doi          = {10.1080/0161-117991854089},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kahn79d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Knight79,
  author       = {H. Gary Knight},
  title        = {Cryptanalysts' Corner},
  journal      = {Cryptologia},
  volume       = {3},
  number       = {4},
  pages        = {242},
  year         = {1979},
  url          = {https://doi.org/10.1080/0161-117991854151},
  doi          = {10.1080/0161-117991854151},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Knight79.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kruh79,
  author       = {Louis Kruh},
  title        = {A Xerograph of a Classic},
  journal      = {Cryptologia},
  volume       = {3},
  number       = {1},
  pages        = {50},
  year         = {1979},
  url          = {https://doi.org/10.1080/0161-117991853792},
  doi          = {10.1080/0161-117991853792},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kruh79.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kruh79a,
  author       = {Louis Kruh},
  title        = {Devices and Machines},
  journal      = {Cryptologia},
  volume       = {3},
  number       = {2},
  pages        = {78--82},
  year         = {1979},
  url          = {https://doi.org/10.1080/0161-117991853864},
  doi          = {10.1080/0161-117991853864},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kruh79a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kruh79b,
  author       = {Louis Kruh},
  title        = {The Deadly Double Advertiesements: Pearl Harbor Warning or Coincidence?},
  journal      = {Cryptologia},
  volume       = {3},
  number       = {3},
  pages        = {166--171},
  year         = {1979},
  url          = {https://doi.org/10.1080/0161-117991853990},
  doi          = {10.1080/0161-117991853990},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kruh79b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kruh79c,
  author       = {Louis Kruh},
  title        = {{CP-III:} One Time Cypher Pad Manual Encryption Device},
  journal      = {Cryptologia},
  volume       = {3},
  number       = {4},
  pages        = {206--209},
  year         = {1979},
  url          = {https://doi.org/10.1080/0161-117991854070},
  doi          = {10.1080/0161-117991854070},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kruh79c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kruh79d,
  author       = {Louis Kruh},
  title        = {Short Notices},
  journal      = {Cryptologia},
  volume       = {3},
  number       = {4},
  pages        = {217--219},
  year         = {1979},
  url          = {https://doi.org/10.1080/0161-117991854106},
  doi          = {10.1080/0161-117991854106},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kruh79d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kruh79e,
  author       = {Louis Kruh},
  title        = {The Day the Friedmans had a Typo in their Photo},
  journal      = {Cryptologia},
  volume       = {3},
  number       = {4},
  pages        = {236--241},
  year         = {1979},
  url          = {https://doi.org/10.1080/0161-117991854142},
  doi          = {10.1080/0161-117991854142},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kruh79e.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/LevineW79,
  author       = {Jack Levine and
                  Michael Willet},
  title        = {The Two-Message Problem in Cipher Text Autokey. Part {I}},
  journal      = {Cryptologia},
  volume       = {3},
  number       = {3},
  pages        = {177--186},
  year         = {1979},
  url          = {https://doi.org/10.1080/0161-117991854016},
  doi          = {10.1080/0161-117991854016},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/LevineW79.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/LevineW79a,
  author       = {Jack Levine and
                  Michael Willet},
  title        = {The Two-Message Problem in Cipher Text Autokey. Part {II}},
  journal      = {Cryptologia},
  volume       = {3},
  number       = {4},
  pages        = {220--231},
  year         = {1979},
  url          = {https://doi.org/10.1080/0161-117991854115},
  doi          = {10.1080/0161-117991854115},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/LevineW79a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Makar79,
  author       = {Boshra H. Makar},
  title        = {Cryptology at St. Peter's College},
  journal      = {Cryptologia},
  volume       = {3},
  number       = {1},
  pages        = {27--28},
  year         = {1979},
  url          = {https://doi.org/10.1080/0161-117991853765},
  doi          = {10.1080/0161-117991853765},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Makar79.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Mellen79,
  author       = {Greg E. Mellen},
  title        = {J. F. Byrne and the Chaohipher Work in Progress},
  journal      = {Cryptologia},
  volume       = {3},
  number       = {3},
  pages        = {136--154},
  year         = {1979},
  url          = {https://doi.org/10.1080/0161-117991853963},
  doi          = {10.1080/0161-117991853963},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Mellen79.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Reeds79,
  author       = {Jim Reeds},
  title        = {Solution of Challenge Cipher},
  journal      = {Cryptologia},
  volume       = {3},
  number       = {2},
  pages        = {83--95},
  year         = {1979},
  url          = {https://doi.org/10.1080/0161-117991853873},
  doi          = {10.1080/0161-117991853873},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Reeds79.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Rohrbach79,
  author       = {Hans Rohrbach},
  title        = {Report on the decipherment of the American Strip Cipher 0-2 by the
                  German Foreign Office},
  journal      = {Cryptologia},
  volume       = {3},
  number       = {1},
  pages        = {16--26},
  year         = {1979},
  url          = {https://doi.org/10.1080/0161-117991853756},
  doi          = {10.1080/0161-117991853756},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Rohrbach79.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Rubin79,
  author       = {Frank Rubin},
  title        = {Solving a Cipher Based on Multiple Random Number Streams},
  journal      = {Cryptologia},
  volume       = {3},
  number       = {3},
  pages        = {155--157},
  year         = {1979},
  url          = {https://doi.org/10.1080/0161-117991853972},
  doi          = {10.1080/0161-117991853972},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Rubin79.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Rubin79a,
  author       = {Frank Rubin},
  title        = {Cryptographic Aspects of Data Compression Codes},
  journal      = {Cryptologia},
  volume       = {3},
  number       = {4},
  pages        = {202--205},
  year         = {1979},
  url          = {https://doi.org/10.1080/0161-117991854061},
  doi          = {10.1080/0161-117991854061},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Rubin79a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Sams79,
  author       = {Eric Sams},
  title        = {Musical Cryptography},
  journal      = {Cryptologia},
  volume       = {3},
  number       = {4},
  pages        = {193--201},
  year         = {1979},
  url          = {https://doi.org/10.1080/0161-117991854052},
  doi          = {10.1080/0161-117991854052},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Sams79.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Shulman79,
  author       = {David Shulman},
  title        = {A Sherlockian Cryptogram},
  journal      = {Cryptologia},
  volume       = {3},
  number       = {1},
  pages        = {54--56},
  year         = {1979},
  url          = {https://doi.org/10.1080/0161-117991853819},
  doi          = {10.1080/0161-117991853819},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Shulman79.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Shulman79a,
  author       = {David Shulman},
  title        = {The {MACBETH} Test Message},
  journal      = {Cryptologia},
  volume       = {3},
  number       = {2},
  pages        = {100--104},
  year         = {1979},
  url          = {https://doi.org/10.1080/0161-117991853891},
  doi          = {10.1080/0161-117991853891},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Shulman79a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Sulzberger79,
  author       = {A. O. Sulzberger},
  title        = {Papers Disclose Allies' Edge in Knowing German Codes},
  journal      = {Cryptologia},
  volume       = {3},
  number       = {1},
  pages        = {51--53},
  year         = {1979},
  url          = {https://doi.org/10.1080/0161-117991853800},
  doi          = {10.1080/0161-117991853800},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Sulzberger79.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Wilson79,
  author       = {David Wilson},
  title        = {Littlewood's Cipher Part {I:} a Challenge},
  journal      = {Cryptologia},
  volume       = {3},
  number       = {2},
  pages        = {120--121},
  year         = {1979},
  url          = {https://doi.org/10.1080/0161-117991853927},
  doi          = {10.1080/0161-117991853927},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Wilson79.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Wilson79a,
  author       = {David Wilson},
  title        = {Littlewood's Cipher Part {II:} a Method of Solution},
  journal      = {Cryptologia},
  volume       = {3},
  number       = {3},
  pages        = {172--176},
  year         = {1979},
  url          = {https://doi.org/10.1080/0161-117991854007},
  doi          = {10.1080/0161-117991854007},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Wilson79a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Winkel79,
  author       = {Brian J. Winkel},
  title        = {There and There},
  journal      = {Cryptologia},
  volume       = {3},
  number       = {1},
  pages        = {57--62},
  year         = {1979},
  url          = {https://doi.org/10.1080/0161-117991853828},
  doi          = {10.1080/0161-117991853828},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Winkel79.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Winkel79a,
  author       = {Brian J. Winkel},
  title        = {There and There},
  journal      = {Cryptologia},
  volume       = {3},
  number       = {4},
  pages        = {248--251},
  year         = {1979},
  url          = {https://doi.org/10.1080/0161-117991854188},
  doi          = {10.1080/0161-117991854188},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Winkel79a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Yuval79,
  author       = {Gideon Yuval},
  title        = {How to Swindle Rabin},
  journal      = {Cryptologia},
  volume       = {3},
  number       = {3},
  pages        = {187--191},
  year         = {1979},
  url          = {https://doi.org/10.1080/0161-117991854025},
  doi          = {10.1080/0161-117991854025},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Yuval79.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}