Pascal and Francis Bibliographic Databases

Help

Search results

Your search

jo.\*:("Cryptologia")

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 25 of 31

  • Page / 2
Export

Selection :

  • and

Cryptographic Applications of Primitive Pythagorean TriplesKAK, Subhash; PRABHU, Monisha.Cryptologia. 2014, Vol 38, Num 3, pp 215-222, issn 0161-1194, 8 p.Article

Revelation for Cilli'sLIST, David; GALLEHAWK, John.Cryptologia. 2014, Vol 38, Num 3, pp 248-265, issn 0161-1194, 18 p.Article

The Making of KECCAKBERTONI, Guido; DAEMEN, Joan; PEETERS, Michael et al.Cryptologia. 2014, Vol 38, Num 1, pp 26-60, issn 0161-1194, 35 p.Article

The Russian Fish with CaviarREZABEK, Randy.Cryptologia. 2014, Vol 38, Num 1, pp 61-76, issn 0161-1194, 16 p.Article

The Jack Butcher Case: A Story of Courage, Commitment, and ConcernFLYNN, William G; MANEKI, Sharon.Cryptologia. 2013, Vol 37, Num 3, pp 210-214, issn 0161-1194, 5 p.Article

Review of Inferno by Dan BrownDOOLEY, John F.Cryptologia. 2014, Vol 38, Num 1, pp 89-92, issn 0161-1194, 4 p.Article

Cryptanalysis of TypexCHANG, Kelly; LOW, Richard M; STAMP, Mark et al.Cryptologia. 2014, Vol 38, Num 2, pp 116-132, issn 0161-1194, 17 p.Article

1929―1931: A Transition Period in U.S. Cryptologic HistoryDOOLEY, John F.Cryptologia. 2013, Vol 37, Num 1, pp 84-98, issn 0161-1194, 15 p.Article

Low-Complexity Key Recovery Attacks on GOST Block CipherCOURTOIS, Nicolas T.Cryptologia. 2013, Vol 37, Num 1, pp 1-10, issn 0161-1194, 10 p.Article

Room 47: The Persian Prelude to the Zimmermann TelegramKELLY, Saul.Cryptologia. 2013, Vol 37, Num 1, pp 11-50, issn 0161-1194, 40 p.Article

Review of Mechanisches Memorieren und Chiffrieren um 1430: Johannes Fontanas Tractatus de instrumentis artis memorie by Horst Kranz and Walter OberschelpSTRASSER, Gerhard F.Cryptologia. 2014, Vol 38, Num 1, pp 96-101, issn 0161-1194, 6 p.Article

Review of Mr. Penumbra's 24-Hour Bookstore by Robin SloanDOOLEY, John F.Cryptologia. 2014, Vol 38, Num 1, pp 93-95, issn 0161-1194, 3 p.Article

The Naval Intercept Station at Bainbridge Island, WashingtonKAHN, David.Cryptologia. 2014, Vol 38, Num 3, pp 244-247, issn 0161-1194, 4 p.Article

The National Cash Register Company Additive Recovery MachineCHRISTENSEN, Chris.Cryptologia. 2014, Vol 38, Num 2, pp 152-177, issn 0161-1194, 26 p.Article

Three-Directional Data Hiding Method for Digital ImagesJUNG, Ki-Hyun; YOO, Kee-Young.Cryptologia. 2014, Vol 38, Num 2, pp 178-191, issn 0161-1194, 14 p.Article

Breaking the BTK Killer's CipherANDERSON, Jeanne.Cryptologia. 2013, Vol 37, Num 3, pp 204-209, issn 0161-1194, 6 p.Article

Cryptanalysis of Beale Cipher Number TwoMATEER, Todd D.Cryptologia. 2013, Vol 37, Num 3, pp 215-232, issn 0161-1194, 18 p.Article

Efficient Cryptanalysis of Homophonic Substitution CiphersDHAVARE, Amrapali; LOW, Richard M; STAMP, Mark et al.Cryptologia. 2013, Vol 37, Num 3, pp 250-281, issn 0161-1194, 32 p.Article

On the Privacy of Khan et al.'s Dynamic ID-Based Remote Authentication Scheme with User AnonymitySUN, Da-Zhi; CAO, Zhen-Fu.Cryptologia. 2013, Vol 37, Num 4, pp 345-355, issn 0161-1194, 11 p.Article

Revealing Secrets in Two Wars: The Spanish Codebreakers at PC Bruno and PC CadixSOLER FUENSANTA, José Ramón; LOPEZ-BREA ESPIAU, Francisco Javier; BONILLA, Diego Navarro et al.Cryptologia. 2013, Vol 37, Num 3, pp 233-249, issn 0161-1194, 17 p.Article

Chaocipher Exhibit 5: History, Analysis, and Solution of Cryptologia's 1990 ChallengeCALOF, Jeff; HILL, Jeff; RUBIN, Moshe et al.Cryptologia. 2014, Vol 38, Num 1, pp 1-25, issn 0161-1194, 25 p.Article

Mathematics in the History of CryptographyROCCA, Charles F.Cryptologia. 2014, Vol 38, Num 3, pp 232-243, issn 0161-1194, 12 p.Article

Writing and Information Literacy in a Cryptology First-Year SeminarKOSS, Lorelei.Cryptologia. 2014, Vol 38, Num 3, pp 223-231, issn 0161-1194, 9 p.Article

A Milestone in Voynich Manuscript Research: Voynich 100 Conference in Monte Porzio Catone, ItalySCHMEH, Klaus.Cryptologia. 2013, Vol 37, Num 3, pp 193-203, issn 0161-1194, 11 p.Article

Atbah-Type Ciphers in the Christian Orient and Numerical Rules in the Construction of Christian Substitution CiphersFRONCZAK, Maria.Cryptologia. 2013, Vol 37, Num 4, pp 338-344, issn 0161-1194, 7 p.Article

  • Page / 2