default search action
Search dblp for Publications
export results for "toc:db/journals/cryptologia/cryptologia3.bht:"
@article{DBLP:journals/cryptologia/Arnold79, author = {Philip M. Arnold}, title = {Ciphers for the Educated Man}, journal = {Cryptologia}, volume = {3}, number = {4}, pages = {215--216}, year = {1979}, url = {https://doi.org/10.1080/0161-117991854098}, doi = {10.1080/0161-117991854098}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Arnold79.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Arnold79a, author = {Philip M. Arnold}, title = {A German Code Book}, journal = {Cryptologia}, volume = {3}, number = {4}, pages = {243--245}, year = {1979}, url = {https://doi.org/10.1080/0161-117991854160}, doi = {10.1080/0161-117991854160}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Arnold79a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/BlakleyB79, author = {Bob Blakley and G. R. Blakley}, title = {Security of Number Theoretic Public Key Cryptosystems against Random Attack, {II}}, journal = {Cryptologia}, volume = {3}, number = {1}, pages = {29--42}, year = {1979}, url = {https://doi.org/10.1080/0161-117991853774}, doi = {10.1080/0161-117991853774}, timestamp = {Thu, 09 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/BlakleyB79.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/BlakleyB79a, author = {Bob Blakley and G. R. Blakley}, title = {Security of Number Theoretic Public Key Cryptosystems against Random Attack, {III}}, journal = {Cryptologia}, volume = {3}, number = {2}, pages = {105--118}, year = {1979}, url = {https://doi.org/10.1080/0161-117991853909}, doi = {10.1080/0161-117991853909}, timestamp = {Thu, 09 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/BlakleyB79a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Fischer79, author = {Elliot Fischer}, title = {Language Redundancy and Cryptanalysis}, journal = {Cryptologia}, volume = {3}, number = {4}, pages = {233--235}, year = {1979}, url = {https://doi.org/10.1080/0161-117991854133}, doi = {10.1080/0161-117991854133}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Fischer79.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Good79, author = {I. J. Good}, title = {Early Work on Computers at Bletchley}, journal = {Cryptologia}, volume = {3}, number = {2}, pages = {65--77}, year = {1979}, url = {https://doi.org/10.1080/0161-117991853855}, doi = {10.1080/0161-117991853855}, timestamp = {Thu, 11 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Good79.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Hammer79, author = {Carl Hammer}, title = {How did {TJB} Encode B2?}, journal = {Cryptologia}, volume = {3}, number = {1}, pages = {9--15}, year = {1979}, url = {https://doi.org/10.1080/0161-117991853747}, doi = {10.1080/0161-117991853747}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Hammer79.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Hardie79, author = {Bradford Hardie}, title = {Book Review}, journal = {Cryptologia}, volume = {3}, number = {2}, pages = {122--126}, year = {1979}, url = {https://doi.org/10.1080/0161-117991853936}, doi = {10.1080/0161-117991853936}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Hardie79.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Hardie79a, author = {Bradford Hardie}, title = {A Theory of Cryptography}, journal = {Cryptologia}, volume = {3}, number = {4}, pages = {246--247}, year = {1979}, url = {https://doi.org/10.1080/0161-117991854179}, doi = {10.1080/0161-117991854179}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Hardie79a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Inman79, author = {Bobby R. Inman}, title = {The {NSA} Perspective on Telecommunications Protection in the Nongovernmental Sector}, journal = {Cryptologia}, volume = {3}, number = {3}, pages = {129--135}, year = {1979}, url = {https://doi.org/10.1080/0161-117991853954}, doi = {10.1080/0161-117991853954}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Inman79.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kahn79, author = {David Kahn}, title = {The Ultra Conference}, journal = {Cryptologia}, volume = {3}, number = {1}, pages = {1--8}, year = {1979}, url = {https://doi.org/10.1080/0161-117991853738}, doi = {10.1080/0161-117991853738}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kahn79.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kahn79a, author = {David Kahn}, title = {American Codes: a Book Review}, journal = {Cryptologia}, volume = {3}, number = {2}, pages = {96--99}, year = {1979}, url = {https://doi.org/10.1080/0161-117991853882}, doi = {10.1080/0161-117991853882}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kahn79a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kahn79b, author = {David Kahn}, title = {A German Consular Cipher}, journal = {Cryptologia}, volume = {3}, number = {2}, pages = {119}, year = {1979}, url = {https://doi.org/10.1080/0161-117991853918}, doi = {10.1080/0161-117991853918}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kahn79b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kahn79c, author = {David Kahn}, title = {The Futility of It All}, journal = {Cryptologia}, volume = {3}, number = {3}, pages = {158--165}, year = {1979}, url = {https://doi.org/10.1080/0161-117991853981}, doi = {10.1080/0161-117991853981}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kahn79c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kahn79d, author = {David Kahn}, title = {The Geheimschreiber}, journal = {Cryptologia}, volume = {3}, number = {4}, pages = {210--214}, year = {1979}, url = {https://doi.org/10.1080/0161-117991854089}, doi = {10.1080/0161-117991854089}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kahn79d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Knight79, author = {H. Gary Knight}, title = {Cryptanalysts' Corner}, journal = {Cryptologia}, volume = {3}, number = {4}, pages = {242}, year = {1979}, url = {https://doi.org/10.1080/0161-117991854151}, doi = {10.1080/0161-117991854151}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Knight79.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kruh79, author = {Louis Kruh}, title = {A Xerograph of a Classic}, journal = {Cryptologia}, volume = {3}, number = {1}, pages = {50}, year = {1979}, url = {https://doi.org/10.1080/0161-117991853792}, doi = {10.1080/0161-117991853792}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kruh79.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kruh79a, author = {Louis Kruh}, title = {Devices and Machines}, journal = {Cryptologia}, volume = {3}, number = {2}, pages = {78--82}, year = {1979}, url = {https://doi.org/10.1080/0161-117991853864}, doi = {10.1080/0161-117991853864}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kruh79a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kruh79b, author = {Louis Kruh}, title = {The Deadly Double Advertiesements: Pearl Harbor Warning or Coincidence?}, journal = {Cryptologia}, volume = {3}, number = {3}, pages = {166--171}, year = {1979}, url = {https://doi.org/10.1080/0161-117991853990}, doi = {10.1080/0161-117991853990}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kruh79b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kruh79c, author = {Louis Kruh}, title = {{CP-III:} One Time Cypher Pad Manual Encryption Device}, journal = {Cryptologia}, volume = {3}, number = {4}, pages = {206--209}, year = {1979}, url = {https://doi.org/10.1080/0161-117991854070}, doi = {10.1080/0161-117991854070}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kruh79c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kruh79d, author = {Louis Kruh}, title = {Short Notices}, journal = {Cryptologia}, volume = {3}, number = {4}, pages = {217--219}, year = {1979}, url = {https://doi.org/10.1080/0161-117991854106}, doi = {10.1080/0161-117991854106}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kruh79d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kruh79e, author = {Louis Kruh}, title = {The Day the Friedmans had a Typo in their Photo}, journal = {Cryptologia}, volume = {3}, number = {4}, pages = {236--241}, year = {1979}, url = {https://doi.org/10.1080/0161-117991854142}, doi = {10.1080/0161-117991854142}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kruh79e.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/LevineW79, author = {Jack Levine and Michael Willet}, title = {The Two-Message Problem in Cipher Text Autokey. Part {I}}, journal = {Cryptologia}, volume = {3}, number = {3}, pages = {177--186}, year = {1979}, url = {https://doi.org/10.1080/0161-117991854016}, doi = {10.1080/0161-117991854016}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/LevineW79.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/LevineW79a, author = {Jack Levine and Michael Willet}, title = {The Two-Message Problem in Cipher Text Autokey. Part {II}}, journal = {Cryptologia}, volume = {3}, number = {4}, pages = {220--231}, year = {1979}, url = {https://doi.org/10.1080/0161-117991854115}, doi = {10.1080/0161-117991854115}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/LevineW79a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Makar79, author = {Boshra H. Makar}, title = {Cryptology at St. Peter's College}, journal = {Cryptologia}, volume = {3}, number = {1}, pages = {27--28}, year = {1979}, url = {https://doi.org/10.1080/0161-117991853765}, doi = {10.1080/0161-117991853765}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Makar79.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Mellen79, author = {Greg E. Mellen}, title = {J. F. Byrne and the Chaohipher Work in Progress}, journal = {Cryptologia}, volume = {3}, number = {3}, pages = {136--154}, year = {1979}, url = {https://doi.org/10.1080/0161-117991853963}, doi = {10.1080/0161-117991853963}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Mellen79.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Reeds79, author = {Jim Reeds}, title = {Solution of Challenge Cipher}, journal = {Cryptologia}, volume = {3}, number = {2}, pages = {83--95}, year = {1979}, url = {https://doi.org/10.1080/0161-117991853873}, doi = {10.1080/0161-117991853873}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Reeds79.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Rohrbach79, author = {Hans Rohrbach}, title = {Report on the decipherment of the American Strip Cipher 0-2 by the German Foreign Office}, journal = {Cryptologia}, volume = {3}, number = {1}, pages = {16--26}, year = {1979}, url = {https://doi.org/10.1080/0161-117991853756}, doi = {10.1080/0161-117991853756}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Rohrbach79.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Rubin79, author = {Frank Rubin}, title = {Solving a Cipher Based on Multiple Random Number Streams}, journal = {Cryptologia}, volume = {3}, number = {3}, pages = {155--157}, year = {1979}, url = {https://doi.org/10.1080/0161-117991853972}, doi = {10.1080/0161-117991853972}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Rubin79.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Rubin79a, author = {Frank Rubin}, title = {Cryptographic Aspects of Data Compression Codes}, journal = {Cryptologia}, volume = {3}, number = {4}, pages = {202--205}, year = {1979}, url = {https://doi.org/10.1080/0161-117991854061}, doi = {10.1080/0161-117991854061}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Rubin79a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Sams79, author = {Eric Sams}, title = {Musical Cryptography}, journal = {Cryptologia}, volume = {3}, number = {4}, pages = {193--201}, year = {1979}, url = {https://doi.org/10.1080/0161-117991854052}, doi = {10.1080/0161-117991854052}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Sams79.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Shulman79, author = {David Shulman}, title = {A Sherlockian Cryptogram}, journal = {Cryptologia}, volume = {3}, number = {1}, pages = {54--56}, year = {1979}, url = {https://doi.org/10.1080/0161-117991853819}, doi = {10.1080/0161-117991853819}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Shulman79.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Shulman79a, author = {David Shulman}, title = {The {MACBETH} Test Message}, journal = {Cryptologia}, volume = {3}, number = {2}, pages = {100--104}, year = {1979}, url = {https://doi.org/10.1080/0161-117991853891}, doi = {10.1080/0161-117991853891}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Shulman79a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Sulzberger79, author = {A. O. Sulzberger}, title = {Papers Disclose Allies' Edge in Knowing German Codes}, journal = {Cryptologia}, volume = {3}, number = {1}, pages = {51--53}, year = {1979}, url = {https://doi.org/10.1080/0161-117991853800}, doi = {10.1080/0161-117991853800}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Sulzberger79.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Wilson79, author = {David Wilson}, title = {Littlewood's Cipher Part {I:} a Challenge}, journal = {Cryptologia}, volume = {3}, number = {2}, pages = {120--121}, year = {1979}, url = {https://doi.org/10.1080/0161-117991853927}, doi = {10.1080/0161-117991853927}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Wilson79.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Wilson79a, author = {David Wilson}, title = {Littlewood's Cipher Part {II:} a Method of Solution}, journal = {Cryptologia}, volume = {3}, number = {3}, pages = {172--176}, year = {1979}, url = {https://doi.org/10.1080/0161-117991854007}, doi = {10.1080/0161-117991854007}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Wilson79a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Winkel79, author = {Brian J. Winkel}, title = {There and There}, journal = {Cryptologia}, volume = {3}, number = {1}, pages = {57--62}, year = {1979}, url = {https://doi.org/10.1080/0161-117991853828}, doi = {10.1080/0161-117991853828}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Winkel79.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Winkel79a, author = {Brian J. Winkel}, title = {There and There}, journal = {Cryptologia}, volume = {3}, number = {4}, pages = {248--251}, year = {1979}, url = {https://doi.org/10.1080/0161-117991854188}, doi = {10.1080/0161-117991854188}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Winkel79a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Yuval79, author = {Gideon Yuval}, title = {How to Swindle Rabin}, journal = {Cryptologia}, volume = {3}, number = {3}, pages = {187--191}, year = {1979}, url = {https://doi.org/10.1080/0161-117991854025}, doi = {10.1080/0161-117991854025}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Yuval79.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.