Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/cryptologia/cryptologia32.bht:"
@article{DBLP:journals/cryptologia/AdlerFLY08, author = {Jeffrey D. Adler and Ryan W. Fuoss and Michael J. Levin and Amanda R. Youell}, title = {Reading Encrypted Diplomatic Correspondence: An Undergraduate Research Project}, journal = {Cryptologia}, volume = {32}, number = {1}, pages = {1--12}, year = {2008}, url = {https://doi.org/10.1080/01611190701498212}, doi = {10.1080/01611190701498212}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/AdlerFLY08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Albrecht08, author = {Martin R. Albrecht}, title = {Algebraic Attacks on the Courtois Toy Cipher}, journal = {Cryptologia}, volume = {32}, number = {3}, pages = {220--276}, year = {2008}, url = {https://doi.org/10.1080/01611190802058139}, doi = {10.1080/01611190802058139}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Albrecht08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Batey08, author = {Mavis Batey}, title = {Dilly Knox - {A} Reminiscence of this Pioneer Enigma Cryptanalyst}, journal = {Cryptologia}, volume = {32}, number = {2}, pages = {104--130}, year = {2008}, url = {https://doi.org/10.1080/01611190801914290}, doi = {10.1080/01611190801914290}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Batey08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Boklan08, author = {Kent D. Boklan}, title = {How {I} Broke an Encrypted Diary from the War of 1812}, journal = {Cryptologia}, volume = {32}, number = {4}, pages = {299--310}, year = {2008}, url = {https://doi.org/10.1080/01611190802232155}, doi = {10.1080/01611190802232155}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Boklan08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Buonafalce08, author = {Augusto Buonafalce}, title = {Cicco Simonetta's Cipher-Breaking Rules}, journal = {Cryptologia}, volume = {32}, number = {1}, pages = {62--70}, year = {2008}, url = {https://doi.org/10.1080/01611190701756585}, doi = {10.1080/01611190701756585}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Buonafalce08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Burke08, author = {Colin B. Burke}, title = {From the Archives: The Last Bombe Run, 1955}, journal = {Cryptologia}, volume = {32}, number = {3}, pages = {277--278}, year = {2008}, url = {https://doi.org/10.1080/01611190802113777}, doi = {10.1080/01611190802113777}, timestamp = {Thu, 03 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Burke08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Bury08, author = {Jan Bury}, title = {From the Archives: Intercepting Best Friend?}, journal = {Cryptologia}, volume = {32}, number = {1}, pages = {84--87}, year = {2008}, url = {https://doi.org/10.1080/01611190701743609}, doi = {10.1080/01611190701743609}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Bury08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Bury08a, author = {Jan Bury}, title = {From the Archives: Inside a Cold War Crypto Cell. Polish Cipher Bureau in the 1980s}, journal = {Cryptologia}, volume = {32}, number = {4}, pages = {351--367}, year = {2008}, url = {https://doi.org/10.1080/01611190802319036}, doi = {10.1080/01611190802319036}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Bury08a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Chan08, author = {Wayne S. Chan}, title = {Key Enclosed: Examining the Evidence for the Missing Key Letter of the Beale Cipher}, journal = {Cryptologia}, volume = {32}, number = {1}, pages = {33--36}, year = {2008}, url = {https://doi.org/10.1080/01611190701577759}, doi = {10.1080/01611190701577759}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Chan08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Christensen08, author = {Chris Christensen}, title = {Review of The Collective Works of Captain George P. McGinnis by George P. McGinnis}, journal = {Cryptologia}, volume = {32}, number = {1}, pages = {88--89}, year = {2008}, url = {https://doi.org/10.1080/01611190701743625}, doi = {10.1080/01611190701743625}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Christensen08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Christensen08a, author = {Chris Christensen}, title = {Review of How to Tell a Secret: Tips, Tricks {\&} Techniques for Breaking Codes {\&} Conveying Covert Information by P. J. Huff and J. G. Lewin}, journal = {Cryptologia}, volume = {32}, number = {1}, pages = {90--91}, year = {2008}, url = {https://doi.org/10.1080/01611190701582460}, doi = {10.1080/01611190701582460}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Christensen08a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Christensen08b, author = {Chris Christensen}, title = {Review of Voices of the Code Breakers: Personal Accounts of the Secret Heroes of World War Ii by Michael Paterson}, journal = {Cryptologia}, volume = {32}, number = {2}, pages = {186--188}, year = {2008}, url = {https://doi.org/10.1080/01611190701856641}, doi = {10.1080/01611190701856641}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Christensen08b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Christensen08c, author = {Chris Christensen}, title = {Review of A\({}^{\mbox{3}}\) and His Algebra by Nancy E. Albert}, journal = {Cryptologia}, volume = {32}, number = {2}, pages = {189--196}, year = {2008}, url = {https://doi.org/10.1080/01611190701869461}, doi = {10.1080/01611190701869461}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Christensen08c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Christensen08d, author = {Chris Christensen}, title = {Review of \emph{The History of Information Security: {A} Comprehensive Handbook} edited by Karl de Leeuw and Jan Bergstra}, journal = {Cryptologia}, volume = {32}, number = {3}, pages = {284--294}, year = {2008}, url = {https://doi.org/10.1080/01611190802125854}, doi = {10.1080/01611190802125854}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Christensen08d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/ChristensenG08, author = {Chris Christensen and Suzanne E. Gladfelter}, title = {Taking a Cryptology Class to Bletchley Park}, journal = {Cryptologia}, volume = {32}, number = {1}, pages = {23--32}, year = {2008}, url = {https://doi.org/10.1080/01611190701548271}, doi = {10.1080/01611190701548271}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/ChristensenG08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Cowan08, author = {Michael J. Cowan}, title = {Breaking Short Playfair Ciphers with the Simulated Annealing Algorithm}, journal = {Cryptologia}, volume = {32}, number = {1}, pages = {71--83}, year = {2008}, url = {https://doi.org/10.1080/01611190701743658}, doi = {10.1080/01611190701743658}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Cowan08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Diffie08, author = {Whitfield Diffie}, title = {What Did We Do Before Biometric Passports? {A} Review of \emph{Who Are You? Identification, Deception, and Surveillance in Early Modern Europe} by Valentin Groebner}, journal = {Cryptologia}, volume = {32}, number = {4}, pages = {368--369}, year = {2008}, url = {https://doi.org/10.1080/01611190802215077}, doi = {10.1080/01611190802215077}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Diffie08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Dooley08, author = {John F. Dooley}, title = {Reviews of Cryptologic Fiction}, journal = {Cryptologia}, volume = {32}, number = {3}, pages = {295--298}, year = {2008}, url = {https://doi.org/10.1080/01611190802114445}, doi = {10.1080/01611190802114445}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Dooley08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Erskine08, author = {Ralph Erskine}, title = {Captured \emph{Kriegsmarine} Enigma Documents at Bletchley Park}, journal = {Cryptologia}, volume = {32}, number = {3}, pages = {199--219}, year = {2008}, url = {https://doi.org/10.1080/01611190802088318}, doi = {10.1080/01611190802088318}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Erskine08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/EsqX08, author = {Louis Kruh}, title = {Review of Figuring It Out At Bletchley Park 1939-1945 by John Gallehawk and Kerry Johnson}, journal = {Cryptologia}, volume = {32}, number = {2}, pages = {184--185}, year = {2008}, url = {https://doi.org/10.1080/01611190801917087}, doi = {10.1080/01611190801917087}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/EsqX08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Gallehawk08, author = {John C. Gallehawk}, title = {Review of Delusions of Intelligence by R. A. Ratcliff}, journal = {Cryptologia}, volume = {32}, number = {1}, pages = {98--100}, year = {2008}, url = {https://doi.org/10.1080/01611190701758045}, doi = {10.1080/01611190701758045}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Gallehawk08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Grajek08, author = {Marek Grajek}, title = {Monument \emph{in Memoriam} of Marian Rejewski, Jerzy R{\'{o}}zycki and Henryk Zygalski Unveiled in Poznan}, journal = {Cryptologia}, volume = {32}, number = {2}, pages = {101--103}, year = {2008}, url = {https://doi.org/10.1080/01611190801916634}, doi = {10.1080/01611190801916634}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Grajek08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/GreyS08, author = {Christopher Grey and Andrew Sturdy}, title = {The 1942 Reorganization of the Government Code and Cypher School}, journal = {Cryptologia}, volume = {32}, number = {4}, pages = {311--333}, year = {2008}, url = {https://doi.org/10.1080/01611190802114411}, doi = {10.1080/01611190802114411}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/GreyS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Hatch08, author = {David A. Hatch}, title = {From the Archives: Friedman Takes the Stand}, journal = {Cryptologia}, volume = {32}, number = {2}, pages = {180--183}, year = {2008}, url = {https://doi.org/10.1080/01611190801916121}, doi = {10.1080/01611190801916121}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Hatch08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Holden08, author = {Joshua Holden}, title = {Review of Complexity and Cryptography: An Introduction by John Talbot and Dominic Welsh}, journal = {Cryptologia}, volume = {32}, number = {1}, pages = {92--97}, year = {2008}, url = {https://doi.org/10.1080/01611190701582619}, doi = {10.1080/01611190701582619}, timestamp = {Mon, 05 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Holden08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Jaworski08, author = {Jerzy Jaworski}, title = {Rejewski-R{\'{o}}zycki-Zygalski Lectures in Computer Science}, journal = {Cryptologia}, volume = {32}, number = {4}, pages = {348--350}, year = {2008}, url = {https://doi.org/10.1080/01611190802253128}, doi = {10.1080/01611190802253128}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Jaworski08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Kahn08, author = {David Kahn}, title = {The Future of the Past - Questions in Cryptologic History}, journal = {Cryptologia}, volume = {32}, number = {1}, pages = {56--61}, year = {2008}, url = {https://doi.org/10.1080/01611190701752915}, doi = {10.1080/01611190701752915}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Kahn08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Massey08, author = {James L. Massey}, title = {Review of Series on Arabic Origins of Cryptology}, journal = {Cryptologia}, volume = {32}, number = {3}, pages = {280--283}, year = {2008}, url = {https://doi.org/10.1080/01611190802129104}, doi = {10.1080/01611190802129104}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Massey08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Melka08, author = {Tomi S. Melka}, title = {Structural Observations Regarding \emph{RongoRongo} Tablet 'Keiti'}, journal = {Cryptologia}, volume = {32}, number = {2}, pages = {155--179}, year = {2008}, url = {https://doi.org/10.1080/01611190801911361}, doi = {10.1080/01611190801911361}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Melka08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Parakh08, author = {Abhishek Parakh}, title = {Oblivious Transfer Based on Key Exchange}, journal = {Cryptologia}, volume = {32}, number = {1}, pages = {37--44}, year = {2008}, url = {https://doi.org/10.1080/01611190701593228}, doi = {10.1080/01611190701593228}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Parakh08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/PhanS08, author = {Raphael Chung{-}Wei Phan and Adi Shamir}, title = {Improved Related-key Attacks on Desx and Desx+}, journal = {Cryptologia}, volume = {32}, number = {1}, pages = {13--22}, year = {2008}, url = {https://doi.org/10.1080/01611190701743690}, doi = {10.1080/01611190701743690}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/PhanS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Schrodel08, author = {Tobias Schr{\"{o}}del}, title = {Breaking Short Vigen{\`{e}}re Ciphers}, journal = {Cryptologia}, volume = {32}, number = {4}, pages = {334--347}, year = {2008}, url = {https://doi.org/10.1080/01611190802336097}, doi = {10.1080/01611190802336097}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptologia/Schrodel08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/SrikwanJ08, author = {Sukamol Srikwan and Markus Jakobsson}, title = {Using Cartoons to Teach Internet Security}, journal = {Cryptologia}, volume = {32}, number = {2}, pages = {137--154}, year = {2008}, url = {https://doi.org/10.1080/01611190701743724}, doi = {10.1080/01611190701743724}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/SrikwanJ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Winkel08, author = {Brian J. Winkel}, title = {Lessons Learned from a Mathematical Cryptology Course}, journal = {Cryptologia}, volume = {32}, number = {1}, pages = {45--55}, year = {2008}, url = {https://doi.org/10.1080/01611190701489732}, doi = {10.1080/01611190701489732}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Winkel08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/X08, title = {Can You Break the Nku Monopoly?}, journal = {Cryptologia}, volume = {32}, number = {2}, pages = {197}, year = {2008}, url = {https://doi.org/10.1080/01611190801920263}, doi = {10.1080/01611190801920263}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/X08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/YangC08, author = {Ching{-}Nung Yang and Tse{-}Shih Chen}, title = {Security Analysis of Authentication of Images Using Recursive Visual Cryptography}, journal = {Cryptologia}, volume = {32}, number = {2}, pages = {131--136}, year = {2008}, url = {https://doi.org/10.1080/01611190701869669}, doi = {10.1080/01611190701869669}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/YangC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.