Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/cryptologia/cryptologia12.bht:"
@article{DBLP:journals/cryptologia/Arnold88, author = {Jonathan P. Arnold}, title = {Herbert O. Yardley, Gangbuster}, journal = {Cryptologia}, volume = {12}, number = {1}, pages = {62--64}, year = {1988}, url = {https://doi.org/10.1080/0161-118891862800}, doi = {10.1080/0161-118891862800}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Arnold88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Barlow88, author = {Mike Barlow}, title = {A Mathematical Word Block Cipher}, journal = {Cryptologia}, volume = {12}, number = {4}, pages = {256--264}, year = {1988}, url = {https://doi.org/10.1080/0161-118891863025}, doi = {10.1080/0161-118891863025}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Barlow88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/BlochD88, author = {Gilbert Bloch and Cipher A. Deavours}, title = {Enigma Avant ultra Enigma before ultra}, journal = {Cryptologia}, volume = {12}, number = {3}, pages = {178--184}, year = {1988}, url = {https://doi.org/10.1080/0161-118891862927}, doi = {10.1080/0161-118891862927}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/BlochD88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/CarrollR88, author = {John M. Carroll and Lynda E. Robbins}, title = {Using Binary derivatives to Test an enhancement of des}, journal = {Cryptologia}, volume = {12}, number = {4}, pages = {193--208}, year = {1988}, url = {https://doi.org/10.1080/0161-118891862945}, doi = {10.1080/0161-118891862945}, timestamp = {Mon, 27 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/CarrollR88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Clarke88, author = {William F. Clarke}, title = {The Years between}, journal = {Cryptologia}, volume = {12}, number = {1}, pages = {52--58}, year = {1988}, url = {https://doi.org/10.1080/0161-118891862783}, doi = {10.1080/0161-118891862783}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Clarke88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Clarke88a, author = {William F. Clarke}, title = {Bletchley Park 1941-1945}, journal = {Cryptologia}, volume = {12}, number = {2}, pages = {90--97}, year = {1988}, url = {https://doi.org/10.1080/0161-118891862828}, doi = {10.1080/0161-118891862828}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Clarke88a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Clarke88b, author = {William F. Clarke}, title = {Post War Organization}, journal = {Cryptologia}, volume = {12}, number = {3}, pages = {174--177}, year = {1988}, url = {https://doi.org/10.1080/0161-118891862918}, doi = {10.1080/0161-118891862918}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Clarke88b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Deavours88, author = {Cipher A. Deavours}, title = {Interactive solution of Beaufort Enciphered Text with Overlapping Keys}, journal = {Cryptologia}, volume = {12}, number = {4}, pages = {247--255}, year = {1988}, url = {https://doi.org/10.1080/0161-118891863016}, doi = {10.1080/0161-118891863016}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Deavours88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Ellison88, author = {Carl M. Ellison}, title = {A solution of the Hebern Messages}, journal = {Cryptologia}, volume = {12}, number = {3}, pages = {144--158}, year = {1988}, url = {https://doi.org/10.1080/0161-118891862882}, doi = {10.1080/0161-118891862882}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Ellison88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Erskine88, author = {Ralph Erskine}, title = {From the Archives Tunny Decrypts}, journal = {Cryptologia}, volume = {12}, number = {1}, pages = {59--61}, year = {1988}, url = {https://doi.org/10.1080/0161-118891862792}, doi = {10.1080/0161-118891862792}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Erskine88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Erskine88a, author = {Ralph Erskine}, title = {From the Archives: U-boat {HF} {WT} signalling}, journal = {Cryptologia}, volume = {12}, number = {2}, pages = {98--106}, year = {1988}, url = {https://doi.org/10.1080/0161-118891862837}, doi = {10.1080/0161-118891862837}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Erskine88a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Hammer88, author = {Carl Hammer}, title = {Second order Homophonic Ciphers}, journal = {Cryptologia}, volume = {12}, number = {1}, pages = {11--20}, year = {1988}, url = {https://doi.org/10.1080/0161-118891862747}, doi = {10.1080/0161-118891862747}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Hammer88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Jamnig88, author = {Peter Jamnig}, title = {Securing the RSA-Cryptosystem against cycling Attacks}, journal = {Cryptologia}, volume = {12}, number = {3}, pages = {159--164}, year = {1988}, url = {https://doi.org/10.1080/0161-118891862891}, doi = {10.1080/0161-118891862891}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Jamnig88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kak88, author = {Subhash C. Kak}, title = {The Aryabhata Cipher}, journal = {Cryptologia}, volume = {12}, number = {2}, pages = {113--117}, year = {1988}, url = {https://doi.org/10.1080/0161-118891862855}, doi = {10.1080/0161-118891862855}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kak88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kak88a, author = {Subhash C. Kak}, title = {A frequency Analysis of the Indus Script}, journal = {Cryptologia}, volume = {12}, number = {3}, pages = {129--143}, year = {1988}, url = {https://doi.org/10.1080/0161-118891862873}, doi = {10.1080/0161-118891862873}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kak88a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kochanski88, author = {Martin Kochanski}, title = {Another Data Insecurity package}, journal = {Cryptologia}, volume = {12}, number = {3}, pages = {165--173}, year = {1988}, url = {https://doi.org/10.1080/0161-118891862909}, doi = {10.1080/0161-118891862909}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kochanski88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kruh88, author = {Louis Kruh}, title = {Stimson, the Black Chamber, and the "gentlemen's Mail" Quote}, journal = {Cryptologia}, volume = {12}, number = {2}, pages = {65--89}, year = {1988}, url = {https://doi.org/10.1080/0161-118891862819}, doi = {10.1080/0161-118891862819}, timestamp = {Sat, 31 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kruh88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kruh88a, author = {Louis Kruh}, title = {Reviews and Things Cryptologic}, journal = {Cryptologia}, volume = {12}, number = {2}, pages = {118--127}, year = {1988}, url = {https://doi.org/10.1080/0161-118891862864}, doi = {10.1080/0161-118891862864}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kruh88a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kruh88b, author = {Louis Kruh}, title = {Reviews and Things Cryptologic}, journal = {Cryptologia}, volume = {12}, number = {3}, pages = {185--192}, year = {1988}, url = {https://doi.org/10.1080/0161-118891862936}, doi = {10.1080/0161-118891862936}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kruh88b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kruh88c, author = {Louis Kruh}, title = {The Beale Cipher as a Bamboozlement - Part {II}}, journal = {Cryptologia}, volume = {12}, number = {4}, pages = {241--246}, year = {1988}, url = {https://doi.org/10.1080/0161-118891863007}, doi = {10.1080/0161-118891863007}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kruh88c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kruh88d, author = {Louis Kruh}, title = {Reviews and Things Cryptologic}, journal = {Cryptologia}, volume = {12}, number = {4}, pages = {265--269}, year = {1988}, url = {https://doi.org/10.1080/0161-118891863034}, doi = {10.1080/0161-118891863034}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kruh88d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/KruhEB88, author = {Louis Kruh and Ralph Erskine and Michael Barlow}, title = {Reviews and Things Cryptologic}, journal = {Cryptologia}, volume = {12}, number = {1}, pages = {37--51}, year = {1988}, url = {https://doi.org/10.1080/0161-118891862774}, doi = {10.1080/0161-118891862774}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/KruhEB88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/KruhM88, author = {Louis Kruh and Johnnie Murray}, title = {A pulp Magazine Cipher}, journal = {Cryptologia}, volume = {12}, number = {4}, pages = {240}, year = {1988}, url = {https://doi.org/10.1080/0161-118891862990}, doi = {10.1080/0161-118891862990}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/KruhM88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/KurosawaIT88, author = {Kaoru Kurosawa and Toshiya Itoh and Masashi Takeuchi}, title = {Public Key Cryptosystem using a reciprocal number with the same Intractability as Factoring a Large number}, journal = {Cryptologia}, volume = {12}, number = {4}, pages = {225--233}, year = {1988}, url = {https://doi.org/10.1080/0161-118891862972}, doi = {10.1080/0161-118891862972}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/KurosawaIT88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Matthews88, author = {Robert A. J. Matthews}, title = {An Empirical Method for Finding the Keylength of periodic Ciphers}, journal = {Cryptologia}, volume = {12}, number = {4}, pages = {220--224}, year = {1988}, url = {https://doi.org/10.1080/0161-118891862963}, doi = {10.1080/0161-118891862963}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Matthews88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Michener88, author = {John R. Michener}, title = {Recent Developments in Electronic Circuitry and their effects on the Implementation of Substitution-Permutation Block codes}, journal = {Cryptologia}, volume = {12}, number = {1}, pages = {21--24}, year = {1988}, url = {https://doi.org/10.1080/0161-118891862756}, doi = {10.1080/0161-118891862756}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Michener88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Miller88, author = {Donald V. Miller}, title = {Cryptanalysis of a two Round Version of des using Index Implications}, journal = {Cryptologia}, volume = {12}, number = {4}, pages = {209--219}, year = {1988}, url = {https://doi.org/10.1080/0161-118891862954}, doi = {10.1080/0161-118891862954}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Miller88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Pearson88, author = {Peter K. Pearson}, title = {Cryptanalysis of the Ciarcia Circuit Cellar Data Encryptor}, journal = {Cryptologia}, volume = {12}, number = {1}, pages = {1--10}, year = {1988}, url = {https://doi.org/10.1080/0161-118891862738}, doi = {10.1080/0161-118891862738}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Pearson88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Polis88, author = {Richard I. Polis}, title = {European Needs and Attitudes towards Information Security}, journal = {Cryptologia}, volume = {12}, number = {4}, pages = {234--239}, year = {1988}, url = {https://doi.org/10.1080/0161-118891862981}, doi = {10.1080/0161-118891862981}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Polis88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Rubin88, author = {Frank Rubin}, title = {The Cryptographic Uses of Post Tag Systems}, journal = {Cryptologia}, volume = {12}, number = {1}, pages = {25--33}, year = {1988}, url = {https://doi.org/10.1080/0161-118891862765}, doi = {10.1080/0161-118891862765}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Rubin88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Wayner88, author = {Peter Wayner}, title = {A Redundancy Reducing Cipher}, journal = {Cryptologia}, volume = {12}, number = {2}, pages = {107--112}, year = {1988}, url = {https://doi.org/10.1080/0161-118891862846}, doi = {10.1080/0161-118891862846}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Wayner88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.