Search dblp for Publications

export results for "toc:db/journals/cryptologia/cryptologia12.bht:"

 download as .bib file

@article{DBLP:journals/cryptologia/Arnold88,
  author       = {Jonathan P. Arnold},
  title        = {Herbert O. Yardley, Gangbuster},
  journal      = {Cryptologia},
  volume       = {12},
  number       = {1},
  pages        = {62--64},
  year         = {1988},
  url          = {https://doi.org/10.1080/0161-118891862800},
  doi          = {10.1080/0161-118891862800},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Arnold88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Barlow88,
  author       = {Mike Barlow},
  title        = {A Mathematical Word Block Cipher},
  journal      = {Cryptologia},
  volume       = {12},
  number       = {4},
  pages        = {256--264},
  year         = {1988},
  url          = {https://doi.org/10.1080/0161-118891863025},
  doi          = {10.1080/0161-118891863025},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Barlow88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/BlochD88,
  author       = {Gilbert Bloch and
                  Cipher A. Deavours},
  title        = {Enigma Avant ultra Enigma before ultra},
  journal      = {Cryptologia},
  volume       = {12},
  number       = {3},
  pages        = {178--184},
  year         = {1988},
  url          = {https://doi.org/10.1080/0161-118891862927},
  doi          = {10.1080/0161-118891862927},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/BlochD88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/CarrollR88,
  author       = {John M. Carroll and
                  Lynda E. Robbins},
  title        = {Using Binary derivatives to Test an enhancement of des},
  journal      = {Cryptologia},
  volume       = {12},
  number       = {4},
  pages        = {193--208},
  year         = {1988},
  url          = {https://doi.org/10.1080/0161-118891862945},
  doi          = {10.1080/0161-118891862945},
  timestamp    = {Mon, 27 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/CarrollR88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Clarke88,
  author       = {William F. Clarke},
  title        = {The Years between},
  journal      = {Cryptologia},
  volume       = {12},
  number       = {1},
  pages        = {52--58},
  year         = {1988},
  url          = {https://doi.org/10.1080/0161-118891862783},
  doi          = {10.1080/0161-118891862783},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Clarke88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Clarke88a,
  author       = {William F. Clarke},
  title        = {Bletchley Park 1941-1945},
  journal      = {Cryptologia},
  volume       = {12},
  number       = {2},
  pages        = {90--97},
  year         = {1988},
  url          = {https://doi.org/10.1080/0161-118891862828},
  doi          = {10.1080/0161-118891862828},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Clarke88a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Clarke88b,
  author       = {William F. Clarke},
  title        = {Post War Organization},
  journal      = {Cryptologia},
  volume       = {12},
  number       = {3},
  pages        = {174--177},
  year         = {1988},
  url          = {https://doi.org/10.1080/0161-118891862918},
  doi          = {10.1080/0161-118891862918},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Clarke88b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Deavours88,
  author       = {Cipher A. Deavours},
  title        = {Interactive solution of Beaufort Enciphered Text with Overlapping
                  Keys},
  journal      = {Cryptologia},
  volume       = {12},
  number       = {4},
  pages        = {247--255},
  year         = {1988},
  url          = {https://doi.org/10.1080/0161-118891863016},
  doi          = {10.1080/0161-118891863016},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Deavours88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Ellison88,
  author       = {Carl M. Ellison},
  title        = {A solution of the Hebern Messages},
  journal      = {Cryptologia},
  volume       = {12},
  number       = {3},
  pages        = {144--158},
  year         = {1988},
  url          = {https://doi.org/10.1080/0161-118891862882},
  doi          = {10.1080/0161-118891862882},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Ellison88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Erskine88,
  author       = {Ralph Erskine},
  title        = {From the Archives Tunny Decrypts},
  journal      = {Cryptologia},
  volume       = {12},
  number       = {1},
  pages        = {59--61},
  year         = {1988},
  url          = {https://doi.org/10.1080/0161-118891862792},
  doi          = {10.1080/0161-118891862792},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Erskine88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Erskine88a,
  author       = {Ralph Erskine},
  title        = {From the Archives: U-boat {HF} {WT} signalling},
  journal      = {Cryptologia},
  volume       = {12},
  number       = {2},
  pages        = {98--106},
  year         = {1988},
  url          = {https://doi.org/10.1080/0161-118891862837},
  doi          = {10.1080/0161-118891862837},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Erskine88a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Hammer88,
  author       = {Carl Hammer},
  title        = {Second order Homophonic Ciphers},
  journal      = {Cryptologia},
  volume       = {12},
  number       = {1},
  pages        = {11--20},
  year         = {1988},
  url          = {https://doi.org/10.1080/0161-118891862747},
  doi          = {10.1080/0161-118891862747},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Hammer88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Jamnig88,
  author       = {Peter Jamnig},
  title        = {Securing the RSA-Cryptosystem against cycling Attacks},
  journal      = {Cryptologia},
  volume       = {12},
  number       = {3},
  pages        = {159--164},
  year         = {1988},
  url          = {https://doi.org/10.1080/0161-118891862891},
  doi          = {10.1080/0161-118891862891},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Jamnig88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kak88,
  author       = {Subhash C. Kak},
  title        = {The Aryabhata Cipher},
  journal      = {Cryptologia},
  volume       = {12},
  number       = {2},
  pages        = {113--117},
  year         = {1988},
  url          = {https://doi.org/10.1080/0161-118891862855},
  doi          = {10.1080/0161-118891862855},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kak88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kak88a,
  author       = {Subhash C. Kak},
  title        = {A frequency Analysis of the Indus Script},
  journal      = {Cryptologia},
  volume       = {12},
  number       = {3},
  pages        = {129--143},
  year         = {1988},
  url          = {https://doi.org/10.1080/0161-118891862873},
  doi          = {10.1080/0161-118891862873},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kak88a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kochanski88,
  author       = {Martin Kochanski},
  title        = {Another Data Insecurity package},
  journal      = {Cryptologia},
  volume       = {12},
  number       = {3},
  pages        = {165--173},
  year         = {1988},
  url          = {https://doi.org/10.1080/0161-118891862909},
  doi          = {10.1080/0161-118891862909},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kochanski88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kruh88,
  author       = {Louis Kruh},
  title        = {Stimson, the Black Chamber, and the "gentlemen's Mail" Quote},
  journal      = {Cryptologia},
  volume       = {12},
  number       = {2},
  pages        = {65--89},
  year         = {1988},
  url          = {https://doi.org/10.1080/0161-118891862819},
  doi          = {10.1080/0161-118891862819},
  timestamp    = {Sat, 31 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kruh88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kruh88a,
  author       = {Louis Kruh},
  title        = {Reviews and Things Cryptologic},
  journal      = {Cryptologia},
  volume       = {12},
  number       = {2},
  pages        = {118--127},
  year         = {1988},
  url          = {https://doi.org/10.1080/0161-118891862864},
  doi          = {10.1080/0161-118891862864},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kruh88a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kruh88b,
  author       = {Louis Kruh},
  title        = {Reviews and Things Cryptologic},
  journal      = {Cryptologia},
  volume       = {12},
  number       = {3},
  pages        = {185--192},
  year         = {1988},
  url          = {https://doi.org/10.1080/0161-118891862936},
  doi          = {10.1080/0161-118891862936},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kruh88b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kruh88c,
  author       = {Louis Kruh},
  title        = {The Beale Cipher as a Bamboozlement - Part {II}},
  journal      = {Cryptologia},
  volume       = {12},
  number       = {4},
  pages        = {241--246},
  year         = {1988},
  url          = {https://doi.org/10.1080/0161-118891863007},
  doi          = {10.1080/0161-118891863007},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kruh88c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Kruh88d,
  author       = {Louis Kruh},
  title        = {Reviews and Things Cryptologic},
  journal      = {Cryptologia},
  volume       = {12},
  number       = {4},
  pages        = {265--269},
  year         = {1988},
  url          = {https://doi.org/10.1080/0161-118891863034},
  doi          = {10.1080/0161-118891863034},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Kruh88d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/KruhEB88,
  author       = {Louis Kruh and
                  Ralph Erskine and
                  Michael Barlow},
  title        = {Reviews and Things Cryptologic},
  journal      = {Cryptologia},
  volume       = {12},
  number       = {1},
  pages        = {37--51},
  year         = {1988},
  url          = {https://doi.org/10.1080/0161-118891862774},
  doi          = {10.1080/0161-118891862774},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/KruhEB88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/KruhM88,
  author       = {Louis Kruh and
                  Johnnie Murray},
  title        = {A pulp Magazine Cipher},
  journal      = {Cryptologia},
  volume       = {12},
  number       = {4},
  pages        = {240},
  year         = {1988},
  url          = {https://doi.org/10.1080/0161-118891862990},
  doi          = {10.1080/0161-118891862990},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/KruhM88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/KurosawaIT88,
  author       = {Kaoru Kurosawa and
                  Toshiya Itoh and
                  Masashi Takeuchi},
  title        = {Public Key Cryptosystem using a reciprocal number with the same Intractability
                  as Factoring a Large number},
  journal      = {Cryptologia},
  volume       = {12},
  number       = {4},
  pages        = {225--233},
  year         = {1988},
  url          = {https://doi.org/10.1080/0161-118891862972},
  doi          = {10.1080/0161-118891862972},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/KurosawaIT88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Matthews88,
  author       = {Robert A. J. Matthews},
  title        = {An Empirical Method for Finding the Keylength of periodic Ciphers},
  journal      = {Cryptologia},
  volume       = {12},
  number       = {4},
  pages        = {220--224},
  year         = {1988},
  url          = {https://doi.org/10.1080/0161-118891862963},
  doi          = {10.1080/0161-118891862963},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Matthews88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Michener88,
  author       = {John R. Michener},
  title        = {Recent Developments in Electronic Circuitry and their effects on the
                  Implementation of Substitution-Permutation Block codes},
  journal      = {Cryptologia},
  volume       = {12},
  number       = {1},
  pages        = {21--24},
  year         = {1988},
  url          = {https://doi.org/10.1080/0161-118891862756},
  doi          = {10.1080/0161-118891862756},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Michener88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Miller88,
  author       = {Donald V. Miller},
  title        = {Cryptanalysis of a two Round Version of des using Index Implications},
  journal      = {Cryptologia},
  volume       = {12},
  number       = {4},
  pages        = {209--219},
  year         = {1988},
  url          = {https://doi.org/10.1080/0161-118891862954},
  doi          = {10.1080/0161-118891862954},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Miller88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Pearson88,
  author       = {Peter K. Pearson},
  title        = {Cryptanalysis of the Ciarcia Circuit Cellar Data Encryptor},
  journal      = {Cryptologia},
  volume       = {12},
  number       = {1},
  pages        = {1--10},
  year         = {1988},
  url          = {https://doi.org/10.1080/0161-118891862738},
  doi          = {10.1080/0161-118891862738},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Pearson88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Polis88,
  author       = {Richard I. Polis},
  title        = {European Needs and Attitudes towards Information Security},
  journal      = {Cryptologia},
  volume       = {12},
  number       = {4},
  pages        = {234--239},
  year         = {1988},
  url          = {https://doi.org/10.1080/0161-118891862981},
  doi          = {10.1080/0161-118891862981},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Polis88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Rubin88,
  author       = {Frank Rubin},
  title        = {The Cryptographic Uses of Post Tag Systems},
  journal      = {Cryptologia},
  volume       = {12},
  number       = {1},
  pages        = {25--33},
  year         = {1988},
  url          = {https://doi.org/10.1080/0161-118891862765},
  doi          = {10.1080/0161-118891862765},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Rubin88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Wayner88,
  author       = {Peter Wayner},
  title        = {A Redundancy Reducing Cipher},
  journal      = {Cryptologia},
  volume       = {12},
  number       = {2},
  pages        = {107--112},
  year         = {1988},
  url          = {https://doi.org/10.1080/0161-118891862846},
  doi          = {10.1080/0161-118891862846},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Wayner88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics