@Preamble{
"\ifx \undefined \booktitle \def \booktitle#1{{{\em #1}}} \fi"
}
@String{ack-nhfb = "Nelson H. F. Beebe,
University of Utah,
Department of Mathematics, 110 LCB,
155 S 1400 E RM 233,
Salt Lake City, UT 84112-0090, USA,
Tel: +1 801 581 5254,
FAX: +1 801 581 4148,
e-mail: \path|beebe@math.utah.edu|,
\path|beebe@acm.org|,
\path|beebe@computer.org| (Internet),
URL: \path|http://www.math.utah.edu/~beebe/|"}
@String{j-CRYPTOLOGIA = "Cryptologia"}
@String{j-IEEE-ANN-HIST-COMPUT = "IEEE Annals of the History of Computing"}
@String{j-INTELL-NATL-SECUR = "Intelligence and national security"}
@String{j-NAMS = "Notices of the {American Mathematical
Society}"}
@String{j-TIMES = "The Times [London, UK]"}
@String{pub-AEGEAN-PARK = "Aegean Park Press"}
@String{pub-AEGEAN-PARK:adr = "Laguna Hills, CA, USA"}
@String{pub-AMS = "American Mathematical Society"}
@String{pub-AMS:adr = "Providence, RI, USA"}
@String{pub-ARTECH = "Artech House Inc."}
@String{pub-ARTECH:adr = "Norwood, MA, USA"}
@String{pub-CAMBRIDGE = "Cambridge University Press"}
@String{pub-CAMBRIDGE:adr = "Cambridge, UK"}
@String{pub-CHAPMAN-HALL-CRC = "Chapman and Hall/CRC"}
@String{pub-CHAPMAN-HALL-CRC:adr = "Boca Raton, FL, USA"}
@String{pub-COLLINS = "Collins"}
@String{pub-COLLINS:adr = "London, UK"}
@String{pub-CRC = "CRC Press"}
@String{pub-CRC:adr = "2000 N.W. Corporate Blvd., Boca Raton,
FL 33431-9868, USA"}
@String{pub-ELSEVIER = "Elsevier"}
@String{pub-ELSEVIER:adr = "Amsterdam, The Netherlands"}
@String{pub-ELSEVIER-ACADEMIC = "Elsevier Academic Press"}
@String{pub-ELSEVIER-ACADEMIC:adr = "Amsterdam, The Netherlands"}
@String{pub-ELSEVIER-SCIENCE = "Elsevier Science, Inc."}
@String{pub-ELSEVIER-SCIENCE:adr = "Amsterdam, The Netherlands"}
@String{pub-HOUGHTON-MIFFLIN = "Houghton-Mifflin"}
@String{pub-HOUGHTON-MIFFLIN:adr = "Boston"}
@String{pub-HUTCHINSON = "Hutchinson"}
@String{pub-HUTCHINSON:adr = "London, UK"}
@String{pub-KNOPF = "Alfred A. Knopf"}
@String{pub-KNOPF:adr = "New York, NY, USA"}
@String{pub-MATH-ASSOC-AMER = "Mathematical Association of America"}
@String{pub-MATH-ASSOC-AMER:adr = "Washington, DC, USA"}
@String{pub-MCGRAW-HILL = "Mc{\-}Graw-Hill"}
@String{pub-MCGRAW-HILL:adr = "New York, NY, USA"}
@String{pub-OXFORD = "Oxford University Press"}
@String{pub-OXFORD:adr = "Walton Street, Oxford OX2 6DP, UK"}
@String{pub-PH = "Pren{\-}tice-Hall"}
@String{pub-PH:adr = "Upper Saddle River, NJ 07458, USA"}
@String{pub-RANDOM-HOUSE = "Random House"}
@String{pub-RANDOM-HOUSE:adr = "New York, NY, USA"}
@String{pub-SIMON-SCHUSTER = "Simon and Schuster"}
@String{pub-SIMON-SCHUSTER:adr = "New York, NY, USA"}
@String{pub-SV = "Springer-Verlag"}
@String{pub-SV:adr = "Berlin, Germany~/ Heidelberg, Germany~/
London, UK~/ etc."}
@String{pub-WESTVIEW = "Westview Press"}
@String{pub-WESTVIEW:adr = "Boulder, CO, USA"}
@String{pub-WILEY = "John Wiley"}
@String{pub-WILEY:adr = "New York, NY, USA"}
@String{pub-YALE = "Yale University Press"}
@String{pub-YALE:adr = "New Haven, CT, USA"}
@Article{Winkel:1977:WC,
author = "Brian J. Winkel",
title = "Why {Cryptologia}?",
journal = j-CRYPTOLOGIA,
volume = "1",
number = "1",
pages = "1--3",
month = jan,
year = "1977",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-117791832733",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:20 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a748865249~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "I",
}
@Article{Mellen:1977:CMSa,
author = "Greg E. Mellen and Lloyd Greenwood",
title = "The Cryptology of Multiplex System: {Part I}:
Simulation and Cryptanalysis",
journal = j-CRYPTOLOGIA,
volume = "1",
number = "1",
pages = "4--16",
month = jan,
year = "1977",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-117791832742",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:20 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a748865250~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "I",
}
@Article{Harris:1977:DKC,
author = "Barbara Harris",
title = "A Different Kind of Column",
journal = j-CRYPTOLOGIA,
volume = "1",
number = "1",
pages = "17--19",
month = jan,
year = "1977",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-117791832751",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:20 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a748865251~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "I",
}
@Article{Reeds:1977:CRN,
author = "James A. Reeds",
title = "``{Cracking}'' a Random Number Generator",
journal = j-CRYPTOLOGIA,
volume = "1",
number = "1",
pages = "20--26",
month = jan,
year = "1977",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-117791832760",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:20 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib;
Theory/crypto.security.bib",
note = "Reprinted in \cite[pp. 509--515]{Deavours:1987:CYT}.",
URL = "http://alumni.cs.ucr.edu/~jsun/random-number.pdf;
http://www.dean.usma.edu/math/pubs/cryptologia/ClassicArticleReprints/V01N1PP20-26JamesReeds.pdf;
http://www.informaworld.com/smpp/content~content=a748865252~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "I",
}
@Article{Kahn:1977:BB,
author = "David Kahn",
title = "The Biggest Bibliography",
journal = j-CRYPTOLOGIA,
volume = "1",
number = "1",
pages = "27--42",
month = jan,
year = "1977",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-117791832779",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:20 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a748865253~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "I",
}
@Article{Shulman:1977:RKR,
author = "David Shulman",
title = "A Reply to {Kahn}'s Review",
journal = j-CRYPTOLOGIA,
volume = "1",
number = "1",
pages = "43--45",
month = jan,
year = "1977",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-117791832788",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:20 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a748865254~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "I",
}
@Article{Deavours:1977:UPC,
author = "Cipher A. Deavours",
title = "Unicity Points in Cryptanalysis",
journal = j-CRYPTOLOGIA,
volume = "1",
number = "1",
pages = "46--68",
month = jan,
year = "1977",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-117791832797",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:20 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a748865255~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "I",
}
@Article{Kruh:1977:CECa,
author = "Louis Kruh",
title = "Cipher Equipment: Cipher Disks",
journal = j-CRYPTOLOGIA,
volume = "1",
number = "1",
pages = "69--75",
month = jan,
year = "1977",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-117791832805",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:20 MDT 2008",
bibsource = "http://ourworld.compuserve.com/homepages/crypto/BIBALL.HTM;
http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a748865256~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "I",
xxtitle = "Cipher Equipment",
}
@Article{Levine:1977:SCA,
author = "Jack Levine and Joel V. Brawley",
title = "Some Cryptographic Applications of Permutation
Polynomials",
journal = j-CRYPTOLOGIA,
volume = "1",
number = "1",
pages = "76--92",
month = jan,
year = "1977",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-117791832814",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:20 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a748865257~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "I",
}
@Article{Winkel:1977:PCCa,
author = "Brian J. Winkel",
title = "{Poe} Challenge Cipher Finally Broken",
journal = j-CRYPTOLOGIA,
volume = "1",
number = "1",
pages = "93--96",
month = jan,
year = "1977",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-117791832823",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:20 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a748865258~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "I",
keywords = "Edgar Allan Poe; G. W. Kulp's cipher",
remark = "See also \booktitle{A Cipher that Deceived Poe} in
Martin Gardner's \booktitle{Mathematical Games} column
in the August 1977 issue of \booktitle{Scientific
American} (\cite{Gardner:1977:MGN} in {\tt
cryptography.bib}).",
}
@Article{Anonymous:1977:BCa,
author = "Anonymous",
title = "Biographies of Contributory",
journal = j-CRYPTOLOGIA,
volume = "1",
number = "1",
pages = "97--99",
month = jan,
year = "1977",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-117791832832",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:20 MDT 2008",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a748865259~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "I",
}
@Article{Hiatt:1977:AD,
author = "Blanchard Hiatt",
title = "Age of Decipherment",
journal = j-CRYPTOLOGIA,
volume = "1",
number = "2",
pages = "101--105",
month = apr,
year = "1977",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-117791832841",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:21 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a748865262~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "I",
}
@Article{Hiatt:1977:CFT,
author = "Blanchard Hiatt",
title = "``{Count} Forward Three Score and Ten \ldots{}''",
journal = j-CRYPTOLOGIA,
volume = "1",
number = "2",
pages = "106--115",
month = apr,
year = "1977",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-117791832850",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:21 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a748865263~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "I",
}
@Article{Schatz:1977:AAC,
author = "Bruce R. Schatz",
title = "Automated Analysis of Cryptogram Cipher Equipment",
journal = j-CRYPTOLOGIA,
volume = "1",
number = "2",
pages = "116--142",
month = apr,
year = "1977",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-117791832869",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:21 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a748865264~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "I",
xxtitle = "Automated Analysis of Cryptograms",
}
@Article{Kruh:1977:CECb,
author = "Louis Kruh",
title = "Cipher Equipment: Converter {M-325(T)}",
journal = j-CRYPTOLOGIA,
volume = "1",
number = "2",
pages = "143--149",
month = apr,
year = "1977",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-117791832878",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:21 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a748865265~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "I",
}
@Article{Mellen:1977:CMSb,
author = "Greg E. Mellen and Lloyd Greenwood",
title = "The Cryptology of Multiplex System: {Part II}",
journal = j-CRYPTOLOGIA,
volume = "1",
number = "2",
pages = "150--165",
month = apr,
year = "1977",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-117791832887",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:21 MDT 2008",
bibsource = "http://ourworld.compuserve.com/homepages/crypto/BIBALL.HTM;
http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a748865266~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "I",
}
@Article{Kahn:1977:GYS,
author = "David Kahn",
title = "``{Get} Out Your Secret Decoders, Boys and Girls
\ldots{}''",
journal = j-CRYPTOLOGIA,
volume = "1",
number = "2",
pages = "166--166",
month = apr,
year = "1977",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-117791832896",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:21 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a748865267~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "I",
}
@Article{Deavours:1977:AHC,
author = "Cipher A. Deavours",
title = "Analysis of the {Hebern} Cryptograph Using Isomorphs",
journal = j-CRYPTOLOGIA,
volume = "1",
number = "2",
pages = "167--185",
month = apr,
year = "1977",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-117791832904",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:21 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a748865268~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "I",
}
@Article{Reeds:1977:RA,
author = "James A. Reeds",
title = "Rotor Algebra",
journal = j-CRYPTOLOGIA,
volume = "1",
number = "2",
pages = "186--194",
month = apr,
year = "1977",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-117791832913",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:21 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a748865269~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "I",
}
@Article{Penney:1977:GR,
author = "Walter Penney",
title = "Grille Reconstruction",
journal = j-CRYPTOLOGIA,
volume = "1",
number = "2",
pages = "195--201",
month = apr,
year = "1977",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-117791832922",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:21 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a748865270~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "I",
}
@Article{Anonymous:1977:BCb,
author = "Anonymous",
title = "Biographies of Contributors",
journal = j-CRYPTOLOGIA,
volume = "1",
number = "2",
pages = "202--204",
month = apr,
year = "1977",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-117791832931",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:21 MDT 2008",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a748865271~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "I",
}
@Article{Kahn:1977:SCI,
author = "David Kahn",
title = "The Significance of Codebreaking and Intelligence in
{Allied} Strategy and Tactics",
journal = j-CRYPTOLOGIA,
volume = "1",
number = "3",
pages = "209--222",
month = jul,
year = "1977",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-117791832940",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:21 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a758845268~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "I",
}
@Article{Deavours:1977:KT,
author = "Cipher A. Deavours",
title = "The Kappa Test",
journal = j-CRYPTOLOGIA,
volume = "1",
number = "3",
pages = "223--231",
month = jul,
year = "1977",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-117791832959",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:21 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a758845269~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "I",
}
@Article{Winkel:1977:WWJ,
author = "Brian J. Winkel",
title = "Word Ways, a Journal Worth Going Your Way",
journal = j-CRYPTOLOGIA,
volume = "1",
number = "3",
pages = "232--234",
month = jul,
year = "1977",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-117791832968",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:21 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a758845270~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "I",
}
@Article{Reeds:1977:ECP,
author = "James A. Reeds",
title = "Entropy Calculations and Particular Methods of
Cryptanalysis",
journal = j-CRYPTOLOGIA,
volume = "1",
number = "3",
pages = "235--254",
month = jul,
year = "1977",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-117791832977",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:21 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a758845271~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "I",
}
@Article{Kruh:1977:CEH,
author = "Louis Kruh",
title = "Cipher Equipment: {Hagelin} Pocket Cryptographer, Type
{CD-57}",
journal = j-CRYPTOLOGIA,
volume = "1",
number = "3",
pages = "255--260",
month = jul,
year = "1977",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-117791832986",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:21 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a758845272~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "I",
}
@Article{Leighton:1977:EUD,
author = "Albert C. Leighton",
title = "The Earliest Use of a Dot Cipher",
journal = j-CRYPTOLOGIA,
volume = "1",
number = "3",
pages = "261--274",
month = jul,
year = "1977",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-117791832995",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:21 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a758845273~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "I",
}
@Article{Mint:1977:DDC,
author = "{Royal Canadian Mint}",
title = "{DPEPE DPJO}: a {Canadian} Coin Piece With a Message",
journal = j-CRYPTOLOGIA,
volume = "1",
number = "3",
pages = "275--277",
month = jul,
year = "1977",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-117791833002",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:21 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a758845274~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "I",
}
@Article{Deavours:1977:KSM,
author = "Cipher A. Deavours",
title = "{Kullback}'s {``Statistical Methods in
Cryptanalysis''}, a Book Review",
journal = j-CRYPTOLOGIA,
volume = "1",
number = "3",
pages = "278--280",
month = jul,
year = "1977",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-117791833011",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:21 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a758845275~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "I",
}
@Article{Morris:1977:ANB,
author = "Robert Morris and Neil J. A. Sloane and Aaron D.
Wyner",
title = "Assessment of the {National Bureau of Standards
Proposed Federal Data Encryption Standard}",
journal = j-CRYPTOLOGIA,
volume = "1",
number = "3",
pages = "281--291",
month = jul,
year = "1977",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-117791833020",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:21 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a758845276~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "I",
}
@Article{NBS:1977:PFI,
author = "{National Bureau of Standards}",
title = "Proposed {Federal Information Processing Data
Encryption Standard}",
journal = j-CRYPTOLOGIA,
volume = "1",
number = "3",
pages = "292--306",
month = jul,
year = "1977",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-117791833039",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:21 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a758845277~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "I",
}
@Article{Anonymous:1977:BCc,
author = "Anonymous",
title = "Biographies of Contributors",
journal = j-CRYPTOLOGIA,
volume = "1",
number = "3",
pages = "307--308",
month = jul,
year = "1977",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-117791833048",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:21 MDT 2008",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a758845278~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "I",
}
@Article{Winkel:1977:E,
author = "Brian J. Winkel",
title = "Epilogue",
journal = j-CRYPTOLOGIA,
volume = "1",
number = "3",
pages = "309--309",
month = jul,
year = "1977",
CODEN = "CRYPE6",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Sat Nov 21 12:35:16 MST 1998",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "I",
}
@Article{Deavours:1977:ICC,
author = "Cipher A. Deavours",
title = "The {Ithaca} Connection: Computer Cryptography in the
Making --- a Special Report",
journal = j-CRYPTOLOGIA,
volume = "1",
number = "4",
pages = "312--317",
month = oct,
year = "1977",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-117791833057",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:22 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a748865284~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "I",
}
@Article{Winkel:1977:PCCb,
author = "Brian J. Winkel",
title = "{Poe} Challenge Cipher Solutions",
journal = j-CRYPTOLOGIA,
volume = "1",
number = "4",
pages = "318--325",
month = oct,
year = "1977",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-117791833066",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:22 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a748865285~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "I",
}
@Article{Eckler:1977:RYN,
author = "A. Ross Eckler",
title = "A Rapid Yes--No Computer-Aided Communicator",
journal = j-CRYPTOLOGIA,
volume = "1",
number = "4",
pages = "326--333",
month = oct,
year = "1977",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-117791833075",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:22 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a748865286~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "I",
}
@Article{Kruh:1977:CEM,
author = "Louis Kruh",
title = "Cipher Equipment: {MA4210} Alphanumeric Pocket
Cipher",
journal = j-CRYPTOLOGIA,
volume = "1",
number = "4",
pages = "334--336",
month = oct,
year = "1977",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-117791833084",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:22 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a748865287~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "I",
xxtitle = "{MA4210} Alphanumeric Pocket Cipher",
}
@Article{Kahn:1977:ECR,
author = "David Kahn",
title = "Ecclesiastical Cryptography --- a Review",
journal = j-CRYPTOLOGIA,
volume = "1",
number = "4",
pages = "337--337",
month = oct,
year = "1977",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-117791833093",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:22 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a748865288~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "I",
}
@Article{Brawley:1977:EVS,
author = "Joel V. Brawley and Jack Levine",
title = "Equivalence of {Vigen{\`e}re} Systems",
journal = j-CRYPTOLOGIA,
volume = "1",
number = "4",
pages = "338--361",
month = oct,
year = "1977",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-117791833101",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:22 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a748865289~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "I",
}
@Article{Marsh:1977:CCC,
author = "D. C. B. Marsh",
title = "Courses in Cryptology --- Cryptography at the
{Colorado School of Mines}",
journal = j-CRYPTOLOGIA,
volume = "1",
number = "4",
pages = "362--363",
month = oct,
year = "1977",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-117791833110",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:22 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a748865290~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "I",
xxtitle = "Cryptography at the {Colorado School of Mines}",
}
@Article{Straight:1977:CCC,
author = "David W. Straight",
title = "Courses in Cryptology --- Cryptanalysis and Data
Security Course at the {University of Tennessee}",
journal = j-CRYPTOLOGIA,
volume = "1",
number = "4",
pages = "363--365",
month = oct,
year = "1977",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-117791833129",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:22 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a748865291~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "I",
xxtitle = "Cryptanalysis and Data Security Course at the
{University of Tennessee}",
}
@Article{Bright:1977:CAD,
author = "Herbert S. Bright",
title = "Cryptanalytic Attack and Defense: Cipher-Text Only,
Known-Plaintext, Chosen-Plaintext",
journal = j-CRYPTOLOGIA,
volume = "1",
number = "4",
pages = "366--370",
month = oct,
year = "1977",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-117791833138",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:22 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a748865292~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "I",
xxtitle = "Cryptanalytic Attack and Defense: Cipher-Text Only,
Known Plaintext",
}
@Article{Kahn:1977:RR,
author = "David Kahn",
title = "Reports From the {Reich}",
journal = j-CRYPTOLOGIA,
volume = "1",
number = "4",
pages = "371--371",
month = oct,
year = "1977",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-117791833147",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:22 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a748865293~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "I",
}
@Article{Kruh:1977:CC,
author = "Louis Kruh",
title = "The Churchyard Ciphers",
journal = j-CRYPTOLOGIA,
volume = "1",
number = "4",
pages = "372--375",
month = oct,
year = "1977",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-117791833156",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:22 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a748865294~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "I",
}
@Article{Highland:1977:CSE,
author = "Harold Joseph Highland",
title = "{CENSORED}: a Simulation Exercise",
journal = j-CRYPTOLOGIA,
volume = "1",
number = "4",
pages = "376--377",
month = oct,
year = "1977",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-117791833165",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:22 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a748865295~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "I",
}
@Article{Kahn:1977:GME,
author = "David Kahn",
title = "{German} Military Eavesdroppers",
journal = j-CRYPTOLOGIA,
volume = "1",
number = "4",
pages = "378--380",
month = oct,
year = "1977",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-117791833174",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:22 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a748865296~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "I",
}
@Article{Deavours:1977:EPH,
author = "Cipher A. Deavours and James A. Reeds",
title = "The {Enigma}: {Part I}: Historical Perspectives",
journal = j-CRYPTOLOGIA,
volume = "1",
number = "4",
pages = "381--391",
month = oct,
year = "1977",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-117791833183",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:22 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a748865297~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "I",
}
@Article{Winkel:1977:S,
author = "Brian J. Winkel",
title = "Solution",
journal = j-CRYPTOLOGIA,
volume = "1",
number = "4",
pages = "391--391",
month = oct,
year = "1977",
CODEN = "CRYPE6",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Sat Nov 21 12:35:16 MST 1998",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "I",
}
@Article{Fagone:1977:MCW,
author = "Peter P. Fagone",
title = "A Message in Cipher Written by {General Cornwallis}
During the {Revolutionary War}",
journal = j-CRYPTOLOGIA,
volume = "1",
number = "4",
pages = "392--395",
month = oct,
year = "1977",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-117791833192",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:22 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a748865298~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "I",
}
@Article{Winkel:1977:TTD,
author = "Brian J. Winkel",
title = "There and There --- a Department",
journal = j-CRYPTOLOGIA,
volume = "1",
number = "4",
pages = "396--405",
month = oct,
year = "1977",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-117791833200",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:22 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a748865299~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "I",
}
@Article{Unknown:1977:TSP,
author = "Unknown",
title = "They Should Be Paranoid",
journal = j-CRYPTOLOGIA,
volume = "1",
number = "4",
pages = "400--401",
month = oct,
year = "1977",
CODEN = "CRYPE6",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Sat Nov 21 12:35:16 MST 1998",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
note = "Originally published in {\em Datamation}, September
1977, pp. 29--30.",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "I",
}
@Article{Simmons:1977:PCM,
author = "Gustavus J. Simmons and Michael J. Norris",
title = "Preliminary Comments on the {M.I.T.} Public-Key
Cryptosystem",
journal = j-CRYPTOLOGIA,
volume = "1",
number = "4",
pages = "406--414",
month = oct,
year = "1977",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-117791833219",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:22 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib;
Theory/crypto.security.bib",
URL = "http://www.informaworld.com/smpp/content~content=a748865300~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "I",
}
@Article{Anonymous:1977:BCd,
author = "Anonymous",
title = "Biographies of Contributors",
journal = j-CRYPTOLOGIA,
volume = "1",
number = "4",
pages = "415--417",
month = oct,
year = "1977",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-117791833228",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:22 MDT 2008",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a748865301~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "I",
}
@Article{Unknown:1977:LE,
author = "Unknown",
title = "Letter from the {Editor}",
journal = j-CRYPTOLOGIA,
volume = "1",
number = "4",
pages = "??--??",
month = oct,
year = "1977",
CODEN = "CRYPE6",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Sat Nov 21 12:35:16 MST 1998",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "I",
}
@Article{Barker:1978:SHT,
author = "Wayne G. Barker",
title = "Solving a {Hagelin}, Type {CD-57}, Cipher",
journal = j-CRYPTOLOGIA,
volume = "2",
number = "1",
pages = "1--8",
month = jan,
year = "1978",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-117891852730",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:23 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a748865303~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "II",
}
@Article{Wilson:1978:CCC,
author = "David Wilson",
title = "Courses in Cryptology --- Cryptanalysis Course Down
Under",
journal = j-CRYPTOLOGIA,
volume = "2",
number = "1",
pages = "9--11",
month = jan,
year = "1978",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-117891852749",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:23 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a748865304~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "II",
}
@Article{Kahn:1978:FNG,
author = "David Kahn",
title = "The {Forschungsamt}: {Nazi Germany}'s Most Secret
Communications Intelligence Agency",
journal = j-CRYPTOLOGIA,
volume = "2",
number = "1",
pages = "12--19",
month = jan,
year = "1978",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-117891852758",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:23 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a748865305~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "II",
}
@Article{Rohrbach:1978:MMMa,
author = "Hans Rohrbach",
title = "Mathematical and Mechanical Methods in Cryptography.
{I}",
journal = j-CRYPTOLOGIA,
volume = "2",
number = "1",
pages = "20--37",
month = jan,
year = "1978",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-117891852767",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
MRclass = "94B99 (00A69 05A15 94-01)",
MRnumber = "81e:94027a",
MRreviewer = "J. S. Joel",
bibdate = "Mon Jun 30 15:38:23 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a748865306~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "II",
}
@Article{Kruh:1978:IWF,
author = "Louis Kruh",
title = "The Inventions of {William F. Friedman}",
journal = j-CRYPTOLOGIA,
volume = "2",
number = "1",
pages = "38--61",
month = jan,
year = "1978",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-117891852776",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:23 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a748865307~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "II",
}
@Article{Rivest:1978:RPC,
author = "Ronald L. Rivest",
title = "Remarks on a Proposed Cryptanalytic Attack on the
{M.I.T.} Public-Key Cryptosystem",
journal = j-CRYPTOLOGIA,
volume = "2",
number = "1",
pages = "62--65",
month = jan,
year = "1978",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-117891852785",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:23 MDT 2008",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib;
Theory/crypto.security.bib",
URL = "http://www.informaworld.com/smpp/content~content=a748865308~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "II",
}
@Article{Deavours:1978:BRB,
author = "Cipher A. Deavours",
title = "A Book Review: {{\booktitle{Cryptanalysis of the
Hagelin Cryptograph}}, by Wayne G. Barker}",
journal = j-CRYPTOLOGIA,
volume = "2",
number = "1",
pages = "66--67",
month = jan,
year = "1978",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-117891852794",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:23 MDT 2008",
bibsource = "http://ourworld.compuserve.com/homepages/crypto/BIBALL.HTM;
http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a748865309~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "II",
xxtitle = "Cryptanalysis of the {Hagelin} Cryptograph --- a
Book Review",
}
@Article{Knight:1978:CCa,
author = "H. Gary Knight",
title = "Cryptanalyst's Corner",
journal = j-CRYPTOLOGIA,
volume = "2",
number = "1",
pages = "68--74",
month = jan,
year = "1978",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-117891852802",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:23 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a748865310~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "II",
}
@Article{Weber:1978:JLS,
author = "Ralph E. Weber",
title = "{James Lovell} and Secret Ciphers During the {American
Revolution}",
journal = j-CRYPTOLOGIA,
volume = "2",
number = "1",
pages = "75--88",
month = jan,
year = "1978",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-117891852811",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:23 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a748865311~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "II",
}
@Article{Winkel:1978:TTDa,
author = "Brian J. Winkel",
title = "There and There --- a Department",
journal = j-CRYPTOLOGIA,
volume = "2",
number = "1",
pages = "89--94",
month = jan,
year = "1978",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-117891852820",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:23 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a748865312~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "II",
}
@Article{Anonymous:1978:BCa,
author = "Anonymous",
title = "Biographies of Contributors",
journal = j-CRYPTOLOGIA,
volume = "2",
number = "1",
pages = "95--96",
month = jan,
year = "1978",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-117891852839",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:23 MDT 2008",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a748865313~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "II",
}
@Article{Rohrbach:1978:MMMb,
author = "Hans Rohrbach",
title = "Mathematical and Mechanical Methods in Cryptography.
{II}",
journal = j-CRYPTOLOGIA,
volume = "2",
number = "2",
pages = "101--121",
month = apr,
year = "1978",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-117891852848",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
MRclass = "94B99 (00A69 05A15 94-01)",
MRnumber = "81e:94027b",
MRreviewer = "J. S. Joel",
bibdate = "Mon Jun 30 15:38:24 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a748865315~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "II",
}
@Article{Kahn:1978:FLB,
author = "David Kahn",
title = "{Friedman}'s Life: a Book Review",
journal = j-CRYPTOLOGIA,
volume = "2",
number = "2",
pages = "122--123",
month = apr,
year = "1978",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-117891852857",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
MRclass = "94B99 (00A69 05A15 94-01)",
MRnumber = "81e:94027b",
MRreviewer = "J. S. Joel",
bibdate = "Mon Jun 30 15:38:24 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a748865316~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "II",
}
@Article{Knight:1978:CCb,
author = "H. Gary Knight",
title = "Cryptanalyst's Corner",
journal = j-CRYPTOLOGIA,
volume = "2",
number = "2",
pages = "124--129",
month = apr,
year = "1978",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-117891852866",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:24 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a748865317~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "II",
xxpages = "124--128",
}
@Article{Kruh:1978:WWA,
author = "Louis Kruh",
title = "Who Wrote {``The American Black Chamber''}?",
journal = j-CRYPTOLOGIA,
volume = "2",
number = "2",
pages = "130--133",
month = apr,
year = "1978",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-117891852875",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:24 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a748865318~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "II",
}
@Article{Deavours:1978:CCC,
author = "Cipher A. Deavours",
title = "Courses in Cryptology --- Cryptology at {Kean
College}",
journal = j-CRYPTOLOGIA,
volume = "2",
number = "2",
pages = "134--138",
month = apr,
year = "1978",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-117891852884",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:24 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a748865319~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "II",
xxtitle = "Cryptology at Kean College",
}
@Article{Kahn:1978:NAY,
author = "David Kahn",
title = "Nuggets from the Archives: {Yardley} Tries Again",
journal = j-CRYPTOLOGIA,
volume = "2",
number = "2",
pages = "139--143",
month = apr,
year = "1978",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-117891852893",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:24 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a748865320~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "II",
}
@Article{Barker:1978:UDC,
author = "Wayne G. Barker",
title = "The Unsolved {D'Agapeyeff} Cipher",
journal = j-CRYPTOLOGIA,
volume = "2",
number = "2",
pages = "144--147",
month = apr,
year = "1978",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-117891852901",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
MRclass = "05A99 (01A60 94B99)",
MRnumber = "80k:05013",
bibdate = "Mon Jun 30 15:38:24 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a748865321~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "II",
}
@Article{Straight:1978:MMC,
author = "David Straight",
title = "{``Modern Methods for Computer Security and
Privacy''}: a Book Review",
journal = j-CRYPTOLOGIA,
volume = "2",
number = "2",
pages = "148--150",
month = apr,
year = "1978",
CODEN = "CRYPE6",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Sat Nov 21 12:35:16 MST 1998",
bibsource = "http://ourworld.compuserve.com/homepages/crypto/BIBALL.HTM;
http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "II",
xxtitle = "An Outline of Computer Security: A Book Review",
}
@Article{Straight:1978:OCS,
author = "David Straight",
title = "{``An Outline of Computer Security''}: a Book Review",
journal = j-CRYPTOLOGIA,
volume = "2",
number = "2",
pages = "148--150",
month = apr,
year = "1978",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-117891852910",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:24 MDT 2008",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a748865322~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "II",
}
@Article{Kahn:1978:PGB,
author = "David Kahn",
title = "{``Pictures Galore''}: a Book Review",
journal = j-CRYPTOLOGIA,
volume = "2",
number = "2",
pages = "151--151",
month = apr,
year = "1978",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-117891852929",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:24 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a748865323~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "II",
}
@Article{Rubin:1978:CMDa,
author = "Frank Rubin",
title = "Computer Methods for Decrypting Multiplex Ciphers",
journal = j-CRYPTOLOGIA,
volume = "2",
number = "2",
pages = "152--160",
month = apr,
year = "1978",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-117891852938",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:24 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a748865324~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "II",
}
@Article{Winkel:1978:CBC,
author = "Brian J. Winkel",
title = "{Casanova} and the {Beaufort} Cipher",
journal = j-CRYPTOLOGIA,
volume = "2",
number = "2",
pages = "161--163",
month = apr,
year = "1978",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-117891852947",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:24 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a748865325~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "II",
}
@Article{Kruh:1978:CC,
author = "Louis Kruh",
title = "Cryptology as a Career",
journal = j-CRYPTOLOGIA,
volume = "2",
number = "2",
pages = "164--167",
month = apr,
year = "1978",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-117891852956",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:24 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a748865326~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "II",
}
@Article{Anonymous:1978:EC,
author = "Anonymous",
title = "Encryption Challenge",
journal = j-CRYPTOLOGIA,
volume = "2",
number = "2",
pages = "168--171",
month = apr,
year = "1978",
CODEN = "CRYPE6",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Sat Nov 21 12:35:16 MST 1998",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "II",
}
@Article{Withheld:1978:EC,
author = "Names Withheld",
title = "Encryption Challenge",
journal = j-CRYPTOLOGIA,
volume = "2",
number = "2",
pages = "168--171",
month = apr,
year = "1978",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-117891852965",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:24 MDT 2008",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a748865327~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "II",
}
@Article{Kruh:1978:CED,
author = "Louis Kruh",
title = "Cipher Equipment: {DH-26} Handheld Encryption Unit",
journal = j-CRYPTOLOGIA,
volume = "2",
number = "2",
pages = "172--177",
month = apr,
year = "1978",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-117891852974",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:24 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a748865328~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "II",
xxtitle = "{DH-26} Handheld Encryption Machine",
}
@Article{Winkel:1978:TAM,
author = "Brian J. Winkel",
title = "A Tribute to {Alf Monge}",
journal = j-CRYPTOLOGIA,
volume = "2",
number = "2",
pages = "178--185",
month = apr,
year = "1978",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-117891852983",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:24 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a748865329~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "II",
xxtitle = "A Tribute to Alf Mong",
}
@Article{Winkel:1978:TTDb,
author = "Brian J. Winkel",
title = "There and There --- a Department",
journal = j-CRYPTOLOGIA,
volume = "2",
number = "2",
pages = "186--194",
month = apr,
year = "1978",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-117891852992",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:24 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a748865330~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "II",
}
@Article{Anonymous:1978:BCb,
author = "Anonymous",
title = "Biographies of Contributors",
journal = j-CRYPTOLOGIA,
volume = "2",
number = "2",
pages = "195--197",
month = apr,
year = "1978",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-117891853009",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:24 MDT 2008",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a748865331~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "II",
}
@Article{Unknown:1978:CCB,
author = "Unknown",
title = "{``Codes and Ciphers''} --- a Book Review",
journal = j-CRYPTOLOGIA,
volume = "2",
number = "2",
pages = "??--??",
month = apr,
year = "1978",
CODEN = "CRYPE6",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Sat Nov 21 12:35:16 MST 1998",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "II",
}
@Article{Unknown:1978:MWB,
author = "Unknown",
title = "{``The Man Who Broke Purple''} --- a Book Review",
journal = j-CRYPTOLOGIA,
volume = "2",
number = "2",
pages = "??--??",
month = apr,
year = "1978",
CODEN = "CRYPE6",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Sat Nov 21 12:35:16 MST 1998",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "II",
}
@Article{Childs:1978:MRG,
author = "J. Rives Childs",
title = "My Recollections of {G.2 A.6}",
journal = j-CRYPTOLOGIA,
volume = "2",
number = "3",
pages = "201--214",
month = jul,
year = "1978",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-117891853018",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:24 MDT 2008",
bibsource = "http://ourworld.compuserve.com/homepages/crypto/BIBALL.HTM;
http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902659~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "II",
xxauthor = "J. Rives Chives",
}
@Article{Rubin:1978:CMDb,
author = "Frank Rubin",
title = "Computer Methods for Decrypting Random Stream
Ciphers",
journal = j-CRYPTOLOGIA,
volume = "2",
number = "3",
pages = "215--231",
month = jul,
year = "1978",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-117891853027",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:24 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
note = "Reprinted in \cite[pp. 493--508]{Deavours:1987:CYT}.",
URL = "http://www.informaworld.com/smpp/content~content=a741902660~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "II",
}
@Article{Arnold:1978:FBC,
author = "Philip M. Arnold",
title = "A Forgotten Book on Ciphers",
journal = j-CRYPTOLOGIA,
volume = "2",
number = "3",
pages = "232--235",
month = jul,
year = "1978",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-117891853036",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:24 MDT 2008",
bibsource = "http://ourworld.compuserve.com/homepages/crypto/BIBALL.HTM;
http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902661~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "II",
}
@Article{Foster:1978:CCC,
author = "Caxton C. Foster",
title = "Courses in Cryptology --- Cryptanalysis and
Computers",
journal = j-CRYPTOLOGIA,
volume = "2",
number = "3",
pages = "236--237",
month = jul,
year = "1978",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-117891853045",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:24 MDT 2008",
bibsource = "http://ourworld.compuserve.com/homepages/crypto/BIBALL.HTM;
http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902662~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "II",
}
@Article{Knight:1978:CCc,
author = "H. Gary Knight",
title = "Cryptanalysts' Corner",
journal = j-CRYPTOLOGIA,
volume = "2",
number = "3",
pages = "238--241",
month = jul,
year = "1978",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-117891853054",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:24 MDT 2008",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902663~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "II",
}
@Article{Kruh:1978:CHIa,
author = "Louis Kruh",
title = "A Catalog of Historical Interest",
journal = j-CRYPTOLOGIA,
volume = "2",
number = "3",
pages = "242--253",
month = jul,
year = "1978",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-117891853063",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:24 MDT 2008",
bibsource = "http://ourworld.compuserve.com/homepages/crypto/BIBALL.HTM;
http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902664~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "II",
}
@Article{Winkel:1978:ACS,
author = "Brian J. Winkel",
title = "{Astle} Cipher Solved",
journal = j-CRYPTOLOGIA,
volume = "2",
number = "3",
pages = "254--256",
month = jul,
year = "1978",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-117891853072",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:24 MDT 2008",
bibsource = "http://ourworld.compuserve.com/homepages/crypto/BIBALL.HTM;
http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902665~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "II",
}
@Article{Kahn:1978:FVB,
author = "David Kahn",
title = "A Famous Variation --- a Book Review",
journal = j-CRYPTOLOGIA,
volume = "2",
number = "3",
pages = "257--257",
month = jul,
year = "1978",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-117891853081",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:24 MDT 2008",
bibsource = "http://ourworld.compuserve.com/homepages/crypto/BIBALL.HTM;
http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902666~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "II",
}
@Article{Kahn:1978:RDB,
author = "David Kahn",
title = "Reveling in Deception --- a Book Review",
journal = j-CRYPTOLOGIA,
volume = "2",
number = "3",
pages = "258--259",
month = jul,
year = "1978",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-117891853090",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:24 MDT 2008",
bibsource = "http://ourworld.compuserve.com/homepages/crypto/BIBALL.HTM;
http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902667~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "II",
}
@Article{Heitzenrater:1978:DWD,
author = "Richard Heitzenrater",
title = "Decoding {Wesley}'s Diaries",
journal = j-CRYPTOLOGIA,
volume = "2",
number = "3",
pages = "260--264",
month = jul,
year = "1978",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-117891853108",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:24 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902668~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "II",
}
@Article{Kahn:1978:SNR,
author = "David Kahn",
title = "Short Notices --- Reviews",
journal = j-CRYPTOLOGIA,
volume = "2",
number = "3",
pages = "265--266",
month = jul,
year = "1978",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-117891853117",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:24 MDT 2008",
bibsource = "http://ourworld.compuserve.com/homepages/crypto/BIBALL.HTM;
http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902669~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "II",
}
@Article{Morris:1978:HCM,
author = "Robert Morris",
title = "The {Hagelin} Cipher Machine ({M-209}): Reconstruction
of the Internal Settings",
journal = j-CRYPTOLOGIA,
volume = "2",
number = "3",
pages = "267--289",
month = jul,
year = "1978",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-117891853126",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:24 MDT 2008",
bibsource = "http://ourworld.compuserve.com/homepages/crypto/BIBALL.HTM;
http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902670~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "II",
}
@Article{Kruh:1978:CRC,
author = "Louis Kruh",
title = "Capsule Reviews for Crypto Buffs",
journal = j-CRYPTOLOGIA,
volume = "2",
number = "3",
pages = "290--292",
month = jul,
year = "1978",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-117891853135",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:24 MDT 2008",
bibsource = "http://ourworld.compuserve.com/homepages/crypto/BIBALL.HTM;
http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902671~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "II",
xxauthor = "David Kahn",
}
@Article{Winkel:1978:TTDc,
author = "Brian J. Winkel",
title = "There and There --- a Department",
journal = j-CRYPTOLOGIA,
volume = "2",
number = "3",
pages = "293--298",
month = jul,
year = "1978",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-117891853144",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:24 MDT 2008",
bibsource = "http://ourworld.compuserve.com/homepages/crypto/BIBALL.HTM;
http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902672~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "II",
}
@Article{Anonymous:1978:BCc,
author = "Anonymous",
title = "Biographies of Contributors",
journal = j-CRYPTOLOGIA,
volume = "2",
number = "3",
pages = "299--300",
month = jul,
year = "1978",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-117891853153",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:24 MDT 2008",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902673~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "II",
}
@Article{Blakley:1978:SNT,
author = "Bob Blakley and G. R. Blakley",
title = "Security of number-theoretic public key cryptosystems
against random attack. {I}",
journal = j-CRYPTOLOGIA,
volume = "2",
number = "4",
pages = "305--321",
month = oct,
year = "1978",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-117891853162",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
MRclass = "94B99 (10A25)",
MRnumber = "81g:94041a",
bibdate = "Mon Jun 30 15:38:25 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902676~db=all~order=page",
ZMnumber = "432.94014",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "II",
}
@Article{Kruh:1978:WNW,
author = "Louis Kruh",
title = "What the {Nazis} Were Doing",
journal = j-CRYPTOLOGIA,
volume = "2",
number = "4",
pages = "322--323",
month = oct,
year = "1978",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-117891853171",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:25 MDT 2008",
bibsource = "http://ourworld.compuserve.com/homepages/crypto/BIBALL.HTM;
http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902677~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "II",
}
@Article{Oakley:1978:RPC,
author = "Howard T. Oakley",
title = "The {Riverbank} Publications on Cryptology",
journal = j-CRYPTOLOGIA,
volume = "2",
number = "4",
pages = "324--330",
month = oct,
year = "1978",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-117891853180",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:25 MDT 2008",
bibsource = "http://ourworld.compuserve.com/homepages/crypto/BIBALL.HTM;
http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902678~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "II",
}
@Article{Kahn:1978:ECO,
author = "David Kahn",
title = "Extraordinary Codebreakers, Outstanding Family: a
Review",
journal = j-CRYPTOLOGIA,
volume = "2",
number = "4",
pages = "331--333",
month = oct,
year = "1978",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-117891853199",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:25 MDT 2008",
bibsource = "http://ourworld.compuserve.com/homepages/crypto/BIBALL.HTM;
http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902679~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "II",
}
@Article{Kruh:1978:NCC,
author = "Louis Kruh",
title = "A Nineteenth Century Challenge Cipher",
journal = j-CRYPTOLOGIA,
volume = "2",
number = "4",
pages = "334--334",
month = oct,
year = "1978",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-117891853207",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:25 MDT 2008",
bibsource = "http://ourworld.compuserve.com/homepages/crypto/BIBALL.HTM;
http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902680~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "II",
xxtitle = "A 19th-Century Challenge Cipher",
}
@Article{Knight:1978:CCd,
author = "H. Gary Knight",
title = "Cryptanalysts' Corner",
journal = j-CRYPTOLOGIA,
volume = "2",
number = "4",
pages = "335--337",
month = oct,
year = "1978",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-117891853216",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:25 MDT 2008",
bibsource = "http://ourworld.compuserve.com/homepages/crypto/BIBALL.HTM;
http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902681~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "II",
}
@Article{Kruh:1978:CHIb,
author = "Louis Kruh",
title = "A Catalog of Historical Interest --- {Part II}",
journal = j-CRYPTOLOGIA,
volume = "2",
number = "4",
pages = "338--349",
month = oct,
year = "1978",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-117891853225",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:25 MDT 2008",
bibsource = "http://ourworld.compuserve.com/homepages/crypto/BIBALL.HTM;
http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902682~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "II",
}
@Article{Callas:1978:ACC,
author = "Nicholas P. Callas",
title = "An Application of Computers to Cryptology",
journal = j-CRYPTOLOGIA,
volume = "2",
number = "4",
pages = "350--364",
month = oct,
year = "1978",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-117891853234",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:25 MDT 2008",
bibsource = "http://ourworld.compuserve.com/homepages/crypto/BIBALL.HTM;
http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902683~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "II",
xxtitle = "An Application of Computers in Cryptography",
}
@Article{Kahn:1978:OWB,
author = "David Kahn",
title = "One of the Worst --- a Book Review",
journal = j-CRYPTOLOGIA,
volume = "2",
number = "4",
pages = "365--365",
month = oct,
year = "1978",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-117891853243",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:25 MDT 2008",
bibsource = "http://ourworld.compuserve.com/homepages/crypto/BIBALL.HTM;
http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902684~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "II",
xxtitle = "One of the Worst: a Review",
}
@Article{Kruh:1978:RC,
author = "Louis Kruh",
title = "Rent a Code",
journal = j-CRYPTOLOGIA,
volume = "2",
number = "4",
pages = "366--367",
month = oct,
year = "1978",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-117891853252",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:25 MDT 2008",
bibsource = "http://ourworld.compuserve.com/homepages/crypto/BIBALL.HTM;
http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902685~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "II",
}
@Article{Winkel:1978:ALC,
author = "Brian J. Winkel",
title = "``{Action} Line'' Challenge",
journal = j-CRYPTOLOGIA,
volume = "2",
number = "4",
pages = "368--370",
month = oct,
year = "1978",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-117891853261",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:25 MDT 2008",
bibsource = "http://ourworld.compuserve.com/homepages/crypto/BIBALL.HTM;
http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902686~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "II",
}
@Article{Kinnucan:1978:DEG,
author = "Paul Kinnucan",
title = "Data Encryption Gurus: {Tuchman} and {Meyer}",
journal = j-CRYPTOLOGIA,
volume = "2",
number = "4",
pages = "371--381",
month = oct,
year = "1978",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-117891853270",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:25 MDT 2008",
bibsource = "http://ourworld.compuserve.com/homepages/crypto/BIBALL.HTM;
http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902687~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "II",
}
@Article{Winkel:1978:TTDd,
author = "Brian J. Winkel",
title = "There and There --- a Department",
journal = j-CRYPTOLOGIA,
volume = "2",
number = "4",
pages = "382--393",
month = oct,
year = "1978",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-117891853289",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:25 MDT 2008",
bibsource = "http://ourworld.compuserve.com/homepages/crypto/BIBALL.HTM;
http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902688~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "II",
}
@Article{Anonymous:1978:BCd,
author = "Anonymous",
title = "Biographies of Contributors",
journal = j-CRYPTOLOGIA,
volume = "2",
number = "4",
pages = "394--395",
month = oct,
year = "1978",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-117891853298",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:25 MDT 2008",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902689~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "II",
}
@Article{Kahn:1979:UC,
author = "David Kahn",
title = "The {Ultra} Conference",
journal = j-CRYPTOLOGIA,
volume = "3",
number = "1",
pages = "1--8",
month = jan,
year = "1979",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-117991853738",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:26 MDT 2008",
bibsource = "http://ourworld.compuserve.com/homepages/crypto/BIBALL.HTM;
http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902770~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "III",
}
@Article{Hammer:1979:HDT,
author = "Carl Hammer",
title = "How Did {TJB} Encode {B2}?",
journal = j-CRYPTOLOGIA,
volume = "3",
number = "1",
pages = "9--15",
month = jan,
year = "1979",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-117991853747",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:26 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902771~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "III",
}
@Article{Rohrbach:1979:RDA,
author = "Hans Rohrbach",
title = "Report on the Decipherment of the {American} Strip
Cipher {O-2} by the {German Foreign Office}",
journal = j-CRYPTOLOGIA,
volume = "3",
number = "1",
pages = "16--26",
month = jan,
year = "1979",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-117991853756",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:26 MDT 2008",
bibsource = "http://ourworld.compuserve.com/homepages/crypto/BIBALL.HTM;
http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902772~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "III",
xxtitle = "Report on the Decipherment of the {American} Strip
Cipher {0-2} by the {German Foreign Office}",
}
@Article{Makar:1979:CSP,
author = "Boshra H. Makar",
title = "Cryptology at {St. Peter's College}",
journal = j-CRYPTOLOGIA,
volume = "3",
number = "1",
pages = "27--28",
month = jan,
year = "1979",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-117991853765",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:26 MDT 2008",
bibsource = "http://ourworld.compuserve.com/homepages/crypto/BIBALL.HTM;
http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902773~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "III",
}
@Article{Blakley:1979:SNTa,
author = "Bob Blakley and G. R. Blakley",
title = "Security of number theoretic public key cryptosystems
against random attack. {II}",
journal = j-CRYPTOLOGIA,
volume = "3",
number = "1",
pages = "29--42",
month = jan,
year = "1979",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-117991853774",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
MRclass = "94B99 (10A25)",
MRnumber = "81g:94041b",
bibdate = "Mon Jun 30 15:38:26 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902774~db=all~order=page",
ZMnumber = "432.94015",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "III",
}
@Article{Ford:1979:HC,
author = "James R. Ford",
title = "The {HP-67/97} Cryptograph",
journal = j-CRYPTOLOGIA,
volume = "3",
number = "1",
pages = "43--50",
month = jan,
year = "1979",
CODEN = "CRYPE6",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Sat Nov 21 12:35:16 MST 1998",
bibsource = "http://ourworld.compuserve.com/homepages/crypto/BIBALL.HTM;
http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "III",
}
@Article{Kruh:1979:XC,
author = "Louis Kruh",
title = "A Xerograph of a Classic",
journal = j-CRYPTOLOGIA,
volume = "3",
number = "1",
pages = "50--50",
month = jan,
year = "1979",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-117991853792",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:26 MDT 2008",
bibsource = "http://ourworld.compuserve.com/homepages/crypto/BIBALL.HTM;
http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902776~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "III",
}
@Article{Sulzberger:1979:PDA,
author = "A. O. {Sulzberger, Jr.}",
title = "Papers Disclose {Allies}' Edge in Knowing {German}
Codes",
journal = j-CRYPTOLOGIA,
volume = "3",
number = "1",
pages = "51--53",
month = jan,
year = "1979",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-117991853800",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:26 MDT 2008",
bibsource = "http://ourworld.compuserve.com/homepages/crypto/BIBALL.HTM;
http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902777~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "III",
}
@Article{Winkel:1979:SC,
author = "Brian J. Winkel",
title = "Studies on Cryptology",
journal = j-CRYPTOLOGIA,
volume = "3",
number = "1",
pages = "52--53",
month = jan,
year = "1979",
CODEN = "CRYPE6",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Nov 23 09:08:28 MST 1998",
bibsource = "http://ourworld.compuserve.com/homepages/crypto/BIBALL.HTM;
http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "III",
}
@Article{Shulman:1979:SC,
author = "David Shulman",
title = "A {Sherlockian} Cryptogram",
journal = j-CRYPTOLOGIA,
volume = "3",
number = "1",
pages = "54--56",
month = jan,
year = "1979",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-117991853819",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:26 MDT 2008",
bibsource = "http://ourworld.compuserve.com/homepages/crypto/BIBALL.HTM;
http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902778~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "III",
}
@Article{Winkel:1979:TTa,
author = "Brian J. Winkel",
title = "There and There",
journal = j-CRYPTOLOGIA,
volume = "3",
number = "1",
pages = "57--62",
month = jan,
year = "1979",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-117991853828",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:26 MDT 2008",
bibsource = "http://ourworld.compuserve.com/homepages/crypto/BIBALL.HTM;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902779~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "III",
}
@Article{Anonymous:1979:BCa,
author = "Anonymous",
title = "Biographies of Contributors",
journal = j-CRYPTOLOGIA,
volume = "3",
number = "1",
pages = "63--64",
month = jan,
year = "1979",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-117991853837",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:26 MDT 2008",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902780~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "III",
}
@Article{Good:1979:EWC,
author = "I. J. Good",
title = "Early work on computers at {Bletchley Park}",
journal = j-CRYPTOLOGIA,
volume = "3",
number = "2",
pages = "65--77",
month = apr,
year = "1979",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-117991853855",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
MRclass = "01A60 (68-03)",
MRnumber = "83d:01045",
bibdate = "Mon Jun 30 15:38:27 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902783~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "III",
xxtitle = "Early Work on Computers at {Bletchley}",
}
@Article{Kruh:1979:DMH,
author = "Louis Kruh",
title = "Devices and Machines: The {Hagelin} Cryptographer,
Type {C-52}",
journal = j-CRYPTOLOGIA,
volume = "3",
number = "2",
pages = "78--82",
month = apr,
year = "1979",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-117991853864",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:27 MDT 2008",
bibsource = "http://ourworld.compuserve.com/homepages/crypto/BIBALL.HTM;
http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902784~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "III",
xxtitle = "Devices and Machines: The Hagelin Cryptographer",
}
@Article{Reeds:1979:SCC,
author = "James A. Reeds",
title = "Solution of Challenge Cipher",
journal = j-CRYPTOLOGIA,
volume = "3",
number = "2",
pages = "83--95",
month = apr,
year = "1979",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-117991853873",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:27 MDT 2008",
bibsource = "http://ourworld.compuserve.com/homepages/crypto/BIBALL.HTM;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902785~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "III",
}
@Article{Kahn:1979:ACB,
author = "David Kahn",
title = "{``American Codes''}: a Book Review",
journal = j-CRYPTOLOGIA,
volume = "3",
number = "2",
pages = "96--99",
month = apr,
year = "1979",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-117991853882",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:27 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902786~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "III",
}
@Article{Shulman:1979:MTM,
author = "David Shulman",
title = "The {Macbeth} Test Message",
journal = j-CRYPTOLOGIA,
volume = "3",
number = "2",
pages = "100--104",
month = apr,
year = "1979",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-117991853891",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:27 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902787~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "III",
}
@Article{Blakley:1979:SNTb,
author = "Bob Blakley and G. R. Blakley",
title = "Security of number theoretic public key cryptosystems
against random attack. {III}",
journal = j-CRYPTOLOGIA,
volume = "3",
number = "2",
pages = "105--118",
month = apr,
year = "1979",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-117991853909",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
MRclass = "94B99 (10A25)",
MRnumber = "81g:94041c",
bibdate = "Mon Jun 30 15:38:27 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902788~db=all~order=page",
ZMnumber = "432.94016",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "III",
}
@Article{Kahn:1979:GCC,
author = "David Kahn",
title = "A {German} Consular Cipher",
journal = j-CRYPTOLOGIA,
volume = "3",
number = "2",
pages = "119--119",
month = apr,
year = "1979",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-117991853918",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:27 MDT 2008",
bibsource = "http://ourworld.compuserve.com/homepages/crypto/BIBALL.HTM;
http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902789~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "III",
}
@Article{Wilson:1979:LCPa,
author = "David Wilson",
title = "{Littlewood}'s Cipher: {Part I}: a Challenge",
journal = j-CRYPTOLOGIA,
volume = "3",
number = "2",
pages = "120--121",
month = apr,
year = "1979",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-117991853927",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:27 MDT 2008",
bibsource = "http://ourworld.compuserve.com/homepages/crypto/BIBALL.HTM;
http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902790~db=all~order=page",
ZMnumber = "416.94010",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "III",
}
@Article{Hardie:1979:BRU,
author = "Bradford Hardie",
title = "Book Review: {Ultra} Goes to War",
journal = j-CRYPTOLOGIA,
volume = "3",
number = "2",
pages = "122--126",
month = apr,
year = "1979",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-117991853936",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:27 MDT 2008",
bibsource = "http://ourworld.compuserve.com/homepages/crypto/BIBALL.HTM;
http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902791~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "III",
}
@Article{Anonymous:1979:BCb,
author = "Anonymous",
title = "Biographies of Contributors",
journal = j-CRYPTOLOGIA,
volume = "3",
number = "2",
pages = "127--128",
month = apr,
year = "1979",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-117991853945",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:27 MDT 2008",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902792~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "III",
}
@Article{Inman:1979:NPT,
author = "Bobby R. Inman",
title = "The {NSA} Perspective on Telecommunications Protection
in the Nongovernmental Sector",
journal = j-CRYPTOLOGIA,
volume = "3",
number = "3",
pages = "129--135",
month = jul,
year = "1979",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-117991853954",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:28 MDT 2008",
bibsource = "http://ourworld.compuserve.com/homepages/crypto/BIBALL.HTM;
http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902794~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "III",
xxtitle = "{NSA} Perspective on Telecommunications Protection",
}
@Article{Mellen:1979:JFB,
author = "Greg Mellen",
title = "{J. F. Byrne} and the {Chaocipher}: Work in Progress",
journal = j-CRYPTOLOGIA,
volume = "3",
number = "3",
pages = "136--154",
month = jul,
year = "1979",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-117991853963",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:28 MDT 2008",
bibsource = "http://ourworld.compuserve.com/homepages/crypto/BIBALL.HTM;
http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902795~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "III",
}
@Article{Rubin:1979:SCB,
author = "Frank Rubin",
title = "Solving a Cipher Based on Multiple Random Number
Streams",
journal = j-CRYPTOLOGIA,
volume = "3",
number = "3",
pages = "155--157",
month = jul,
year = "1979",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-117991853972",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:28 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902796~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "III",
}
@Article{Kahn:1979:FIA,
author = "David Kahn",
title = "The Futility of It All",
journal = j-CRYPTOLOGIA,
volume = "3",
number = "3",
pages = "158--165",
month = jul,
year = "1979",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-117991853981",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
MRclass = "01A55",
MRnumber = "82f:01050",
bibdate = "Mon Jun 30 15:38:28 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902797~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "III",
}
@Article{Kruh:1979:DDA,
author = "Louis Kruh",
title = "The Deadly Double Advertisements: {Pearl Harbor}
Warning or Coincidence",
journal = j-CRYPTOLOGIA,
volume = "3",
number = "3",
pages = "166--171",
month = jul,
year = "1979",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-117991853990",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:28 MDT 2008",
bibsource = "http://ourworld.compuserve.com/homepages/crypto/BIBALL.HTM;
http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902798~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "III",
xxtitle = "Deadly Double Ad --- {Pearl Harbor} Warning or
Coincidence",
}
@Article{Wilson:1979:LCPb,
author = "David Wilson",
title = "{Littlewood}'s Cipher: {Part II}: a Method of
Solution",
journal = j-CRYPTOLOGIA,
volume = "3",
number = "3",
pages = "172--176",
month = jul,
year = "1979",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-117991854007",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:28 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902799~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "III",
xxtitle = "{Littlewood}'s Cipher: Solution",
}
@Article{Levine:1979:TMPa,
author = "Jack Levine and Michael Willet",
title = "The Two-Message Problem in Cipher Text {Autokey}.
{Part I}",
journal = j-CRYPTOLOGIA,
volume = "3",
number = "3",
pages = "177--186",
month = jul,
year = "1979",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-117991854016",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
MRclass = "94B99",
MRnumber = "81b:94052a",
MRreviewer = "James W. Snively, Jr.",
bibdate = "Mon Jun 30 15:38:28 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902800~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "III",
}
@Article{Yuval:1979:HSR,
author = "Gideon Yuval",
title = "How to Swindle {Rabin}",
journal = j-CRYPTOLOGIA,
volume = "3",
number = "3",
pages = "187--189",
month = jul,
year = "1979",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-117991854025",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:28 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib;
Theory/crypto.security.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902801~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "III",
}
@Article{Kahn:1979:CRR,
author = "David Kahn",
title = "Classic Revive ??: a Review",
journal = j-CRYPTOLOGIA,
volume = "3",
number = "3",
pages = "190--191",
month = jul,
year = "1979",
CODEN = "CRYPE6",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Nov 23 09:08:28 MST 1998",
bibsource = "http://ourworld.compuserve.com/homepages/crypto/BIBALL.HTM;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "III",
}
@Article{Anonymous:1979:SBC,
author = "Anonymous",
title = "The {Second Beale Cipher Symposium} --- Call for
Papers",
journal = j-CRYPTOLOGIA,
volume = "3",
number = "3",
pages = "191--191",
month = jul,
year = "1979",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-117991854034",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:28 MDT 2008",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902802~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "III",
}
@Article{Anonymous:1979:BCc,
author = "Anonymous",
title = "Biographies of Contributors",
journal = j-CRYPTOLOGIA,
volume = "3",
number = "3",
pages = "192--192",
month = jul,
year = "1979",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-117991854043",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:28 MDT 2008",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902803~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "III",
}
@Article{Kahn:1979:SCI,
author = "David Kahn",
title = "The Significance of Codebreaking and Intelligence in
{Allied} Strategy and Tactics",
journal = j-CRYPTOLOGIA,
volume = "3",
number = "3",
pages = "209--222",
month = jul,
year = "1979",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-117791832940",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:28 MDT 2008",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a748865273~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "III",
}
@Article{Deavours:1979:KT,
author = "C. A. Deavours",
title = "The Kappa Test",
journal = j-CRYPTOLOGIA,
volume = "3",
number = "3",
pages = "223--231",
month = jul,
year = "1979",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-117791832959",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:28 MDT 2008",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a748865274~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "III",
}
@Article{Winkel:1979:WWJ,
author = "Brian J. Winkel",
title = "Word Ways, a Journal Worth Going Your Way",
journal = j-CRYPTOLOGIA,
volume = "3",
number = "3",
pages = "232--234",
month = jul,
year = "1979",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-117791832968",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:28 MDT 2008",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a748865275~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "III",
}
@Article{Reeds:1979:ECP,
author = "James Reeds",
title = "Entropy Calculations and Particular Methods of
Cryptanalysis",
journal = j-CRYPTOLOGIA,
volume = "3",
number = "3",
pages = "235--254",
month = jul,
year = "1979",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-117791832977",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:28 MDT 2008",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a748865276~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "III",
}
@Article{Kruh:1979:CE,
author = "Louis Kruh",
title = "Cipher Equipment",
journal = j-CRYPTOLOGIA,
volume = "3",
number = "3",
pages = "255--260",
month = jul,
year = "1979",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-117791832986",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:28 MDT 2008",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a748865277~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "III",
}
@Article{Leighton:1979:EUD,
author = "Albert C. Leighton",
title = "``{The} Earliest Use of a Dot Cipher''",
journal = j-CRYPTOLOGIA,
volume = "3",
number = "3",
pages = "261--274",
month = jul,
year = "1979",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-117791832995",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:28 MDT 2008",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a748865278~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "III",
}
@Article{Mint:1979:DDC,
author = "{Royal Canadian Mint}",
title = "{DPEPE DPJO}: a {Canadian} Coin Piece With a Message",
journal = j-CRYPTOLOGIA,
volume = "3",
number = "3",
pages = "275--277",
month = jul,
year = "1979",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-117791833002",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:28 MDT 2008",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a748865279~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "III",
}
@Article{Deavours:1979:KSM,
author = "C. A. Deavours",
title = "{Kullback's ``Statistical Methods in Cryptanalysis''}
--- Book Review",
journal = j-CRYPTOLOGIA,
volume = "3",
number = "3",
pages = "278--280",
month = jul,
year = "1979",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-117791833011",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:28 MDT 2008",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
note = "See \cite{Kullback:1976:SMC}.",
URL = "http://www.informaworld.com/smpp/content~content=a748865280~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "III",
}
@Article{Morris:1979:ANB,
author = "Robert Morris and N. J. A. Sloane and A. D. Wyner",
title = "Assessment of the {National Bureau of Standards}
Proposed {Federal Data Encryption Standard}",
journal = j-CRYPTOLOGIA,
volume = "3",
number = "3",
pages = "281--291",
month = jul,
year = "1979",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-117791833020",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:28 MDT 2008",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a748865281~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "III",
}
@Article{Anonymous:1979:PFI,
author = "Anonymous",
title = "Proposed {Federal Information Processing Data
Encryption Standard}",
journal = j-CRYPTOLOGIA,
volume = "3",
number = "3",
pages = "292--306",
month = jul,
year = "1979",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-117791833039",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:28 MDT 2008",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a748865282~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "III",
}
@Article{Anonymous:1979:BCd,
author = "Anonymous",
title = "Biographies of Contributors",
journal = j-CRYPTOLOGIA,
volume = "3",
number = "3",
pages = "307--308",
month = jul,
year = "1979",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-117791833048",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:28 MDT 2008",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a748865283~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "III",
}
@Article{Sams:1979:MC,
author = "Eric Sams",
title = "Musical Cryptography",
journal = j-CRYPTOLOGIA,
volume = "3",
number = "4",
pages = "193--201",
month = oct,
year = "1979",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-117991854052",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:28 MDT 2008",
bibsource = "http://ourworld.compuserve.com/homepages/crypto/BIBALL.HTM;
http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902805~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "III",
}
@Article{Rubin:1979:CAD,
author = "Frank Rubin",
title = "Cryptographic Aspects of Data Compression Codes",
journal = j-CRYPTOLOGIA,
volume = "3",
number = "4",
pages = "202--205",
month = oct,
year = "1979",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-117991854061",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:28 MDT 2008",
bibsource = "http://ourworld.compuserve.com/homepages/crypto/BIBALL.HTM;
http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
note = "See also {\em Comm. ACM}, 19 (November 1976):
616--623.",
URL = "http://www.informaworld.com/smpp/content~content=a741902806~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "III",
xxtitle = "Crypto of Data Compression Codes",
xxtitle = "Experiments in Text File Compression",
}
@Article{Kruh:1979:CIO,
author = "Louis Kruh",
title = "{CP-III}: One Time Cypher Pad Manual Encryption
Device",
journal = j-CRYPTOLOGIA,
volume = "3",
number = "4",
pages = "206--209",
month = oct,
year = "1979",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-117991854070",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:28 MDT 2008",
bibsource = "http://ourworld.compuserve.com/homepages/crypto/BIBALL.HTM;
http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902807~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "III",
}
@Article{Kahn:1979:G,
author = "David Kahn",
title = "The {Geheimschreiber}",
journal = j-CRYPTOLOGIA,
volume = "3",
number = "4",
pages = "210--214",
month = oct,
year = "1979",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-117991854089",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:28 MDT 2008",
bibsource = "http://ourworld.compuserve.com/homepages/crypto/BIBALL.HTM;
http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902808~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "III",
}
@Article{Unknown:1979:IGS,
author = "Unknown",
title = "Interrogation on {German} secret teletypewriters",
journal = j-CRYPTOLOGIA,
volume = "3",
number = "4",
pages = "211--214",
month = oct,
year = "1979",
CODEN = "CRYPE6",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Wed Nov 25 16:35:55 1998",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "III",
xxnote = "Check pages??. This is probably the same as
\cite{Kahn:1979:G}.",
}
@Article{Arnold:1979:CEM,
author = "Philip M. Arnold",
title = "Ciphers for the Educated Man",
journal = j-CRYPTOLOGIA,
volume = "3",
number = "4",
pages = "215--216",
month = oct,
year = "1979",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-117991854098",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:28 MDT 2008",
bibsource = "http://ourworld.compuserve.com/homepages/crypto/BIBALL.HTM;
http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902809~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "III",
}
@Article{Kruh:1979:SN,
author = "Louis Kruh",
title = "Short Notices",
journal = j-CRYPTOLOGIA,
volume = "3",
number = "4",
pages = "217--219",
month = oct,
year = "1979",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-117991854106",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:28 MDT 2008",
bibsource = "http://ourworld.compuserve.com/homepages/crypto/BIBALL.HTM;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902810~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "III",
}
@Article{Levine:1979:TMPb,
author = "Jack Levine and Michael Willet",
title = "The Two-Message Problem in Cipher Text {Autokey}.
{Part II}",
journal = j-CRYPTOLOGIA,
volume = "3",
number = "4",
pages = "220--231",
month = oct,
year = "1979",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-117991854115",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
MRclass = "94B99",
MRnumber = "81b:94052b",
MRreviewer = "James W. Snively, Jr.",
bibdate = "Mon Jun 30 15:38:28 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902811~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "III",
}
@Article{Anonymous:1979:MC,
author = "Anonymous",
title = "A Musical Cipher",
journal = j-CRYPTOLOGIA,
volume = "3",
number = "4",
pages = "232--232",
month = oct,
year = "1979",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-117991854124",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:28 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902812~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "III",
}
@Article{Fischer:1979:LRC,
author = "Elliot Fischer",
title = "Language Redundancy and Cryptanalysis",
journal = j-CRYPTOLOGIA,
volume = "3",
number = "4",
pages = "233--235",
month = oct,
year = "1979",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-117991854133",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:28 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902813~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "III",
}
@Article{Kruh:1979:DFT,
author = "Louis Kruh",
title = "The Day the {Friedmans} Had a Typo in Their Photo",
journal = j-CRYPTOLOGIA,
volume = "3",
number = "4",
pages = "236--241",
month = oct,
year = "1979",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-117991854142",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:28 MDT 2008",
bibsource = "http://ourworld.compuserve.com/homepages/crypto/BIBALL.HTM;
http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902814~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "III",
}
@Article{Knight:1979:CC,
author = "H. Gary Knight",
title = "Cryptanalysts' Corner",
journal = j-CRYPTOLOGIA,
volume = "3",
number = "4",
pages = "242--242",
month = oct,
year = "1979",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-117991854151",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:28 MDT 2008",
bibsource = "http://ourworld.compuserve.com/homepages/crypto/BIBALL.HTM;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902815~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "III",
}
@Article{Arnold:1979:GCB,
author = "Philip M. Arnold",
title = "A {German} Code Book",
journal = j-CRYPTOLOGIA,
volume = "3",
number = "4",
pages = "243--245",
month = oct,
year = "1979",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-117991854160",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:28 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
note = "See Cryptologia {\bf 4}(1), 1980, pp. 54--55 for a
picture of the code book.",
URL = "http://www.informaworld.com/smpp/content~content=a741902816~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "III",
}
@Article{Hardie:1979:TC,
author = "Bradford Hardie",
title = "A Theory of Cryptography",
journal = j-CRYPTOLOGIA,
volume = "3",
number = "4",
pages = "246--247",
month = oct,
year = "1979",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-117991854179",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:28 MDT 2008",
bibsource = "http://ourworld.compuserve.com/homepages/crypto/BIBALL.HTM;
http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902817~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "III",
}
@Article{Winkel:1979:TTb,
author = "Brian J. Winkel",
title = "There and There",
journal = j-CRYPTOLOGIA,
volume = "3",
number = "4",
pages = "248--251",
month = oct,
year = "1979",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-117991854188",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:28 MDT 2008",
bibsource = "http://ourworld.compuserve.com/homepages/crypto/BIBALL.HTM;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902818~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "III",
}
@Article{Anonymous:1979:BCe,
author = "Anonymous",
title = "Biographies of Contributors",
journal = j-CRYPTOLOGIA,
volume = "3",
number = "4",
pages = "252--253",
month = oct,
year = "1979",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-117991854197",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:28 MDT 2008",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902819~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "III",
}
@Article{Lu:1980:SEP,
author = "S. C. Lu and L. N. Lee",
title = "A Simple and Effective Public-Key Cryptosystem",
journal = j-CRYPTOLOGIA,
volume = "4",
number = "??",
pages = "??--??",
month = "????",
year = "1980",
CODEN = "CRYPE6",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Nov 23 09:08:28 MST 1998",
bibsource = "http://ourworld.compuserve.com/homepages/crypto/BIBALL.HTM;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
note = "See also {\em Comsat Technical Review}, {\bf 9},
15--24 (1979).",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "IV",
}
@Article{Schuetz:1980:SSU,
author = "Arthur Schuetz",
title = "Secret Service Unmasked",
journal = j-CRYPTOLOGIA,
volume = "4",
number = "??",
pages = "??--??",
month = "????",
year = "1980",
CODEN = "CRYPE6",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Nov 23 09:08:28 MST 1998",
bibsource = "http://ourworld.compuserve.com/homepages/crypto/BIBALL.HTM;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "IV",
}
@Article{Fagone:1980:SCE,
author = "Peter P. Fagone",
title = "The Solution of a {Cromwellian} Era Spy Message (Circa
1648)",
journal = j-CRYPTOLOGIA,
volume = "4",
number = "1",
pages = "1--4",
month = jan,
year = "1980",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118091854735",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:29 MDT 2008",
bibsource = "http://ourworld.compuserve.com/homepages/crypto/BIBALL.HTM;
http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902854~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "IV",
}
@Article{Kruh:1980:CDCa,
author = "Louis Kruh",
title = "Cipher Devices: The {Cryptomatic HC-520}",
journal = j-CRYPTOLOGIA,
volume = "4",
number = "1",
pages = "5--14",
month = jan,
year = "1980",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118091854744",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:29 MDT 2008",
bibsource = "http://ourworld.compuserve.com/homepages/crypto/BIBALL.HTM;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902855~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "IV",
}
@Article{Golomb:1980:CRG,
author = "Solomon W. Golomb",
title = "Cryptographic Reflections on the Genetic Code",
journal = j-CRYPTOLOGIA,
volume = "4",
number = "1",
pages = "15--19",
month = jan,
year = "1980",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118091854753",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:29 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902856~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "IV",
}
@Article{Richter:1980:NPK,
author = "Michael Richter",
title = "A Note on Public-Key Cryptosystems",
journal = j-CRYPTOLOGIA,
volume = "4",
number = "1",
pages = "20--22",
month = jan,
year = "1980",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118091854762",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:29 MDT 2008",
bibsource = "http://ourworld.compuserve.com/homepages/crypto/BIBALL.HTM;
http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902857~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "IV",
}
@Article{Kahn:1980:DTB,
author = "David Kahn",
title = "{``Deciphered Texts''}: a Book Review",
journal = j-CRYPTOLOGIA,
volume = "4",
number = "1",
pages = "22--22",
month = jan,
year = "1980",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118091854771",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:29 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902858~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "IV",
}
@Article{Kruh:1980:MF,
author = "Louis Kruh",
title = "Memories of {Friedman}",
journal = j-CRYPTOLOGIA,
volume = "4",
number = "1",
pages = "23--26",
month = jan,
year = "1980",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118091854780",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:29 MDT 2008",
bibsource = "http://ourworld.compuserve.com/homepages/crypto/BIBALL.HTM;
http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902859~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "IV",
}
@Article{Knight:1980:CCa,
author = "H. Gary Knight",
title = "Cryptanalysts' Corner",
journal = j-CRYPTOLOGIA,
volume = "4",
number = "1",
pages = "27--29",
month = jan,
year = "1980",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118091854799",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:29 MDT 2008",
bibsource = "http://ourworld.compuserve.com/homepages/crypto/BIBALL.HTM;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902860~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "IV",
}
@Article{Rivest:1980:FBE,
author = "Ronald L. Rivest",
title = "``{Forwards} and Backwards'' Encryption",
journal = j-CRYPTOLOGIA,
volume = "4",
number = "1",
pages = "30--33",
month = jan,
year = "1980",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118091854807",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:29 MDT 2008",
bibsource = "http://ourworld.compuserve.com/homepages/crypto/BIBALL.HTM;
http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
note = "Reprinted in \cite[pp. 433--437]{Deavours:1987:CYT}.",
URL = "http://www.informaworld.com/smpp/content~content=a741902861~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "IV",
}
@Article{Kruh:1980:CSC,
author = "Louis Kruh",
title = "Ciphering System for a {19th Century} Challenge
Cipher",
journal = j-CRYPTOLOGIA,
volume = "4",
number = "1",
pages = "34--35",
month = jan,
year = "1980",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118091854816",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:29 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902862~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "IV",
}
@Article{Kahn:1980:PUC,
author = "David Kahn",
title = "Problems of the Unbreakable Cipher",
journal = j-CRYPTOLOGIA,
volume = "4",
number = "1",
pages = "36--40",
month = jan,
year = "1980",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118091854825",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:29 MDT 2008",
bibsource = "http://ourworld.compuserve.com/homepages/crypto/BIBALL.HTM;
http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902863~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "IV",
}
@Article{Shulman:1980:ASS,
author = "David Shulman",
title = "Another Solution to the {Sherlockian} Cryptogram",
journal = j-CRYPTOLOGIA,
volume = "4",
number = "1",
pages = "41--41",
month = jan,
year = "1980",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118091854834",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:29 MDT 2008",
bibsource = "http://ourworld.compuserve.com/homepages/crypto/BIBALL.HTM;
http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902864~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "IV",
xxtitle = "{Sherlockian} Cryptogram",
}
@Article{Kahn:1980:ME,
author = "David Kahn",
title = "The Market for Encryption",
journal = j-CRYPTOLOGIA,
volume = "4",
number = "1",
pages = "42--44",
month = jan,
year = "1980",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118091854843",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:29 MDT 2008",
bibsource = "http://ourworld.compuserve.com/homepages/crypto/BIBALL.HTM;
http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902865~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "IV",
}
@Article{Ford:1980:HC,
author = "James R. Ford",
title = "The {HP-67/97} Cryptograph",
journal = j-CRYPTOLOGIA,
volume = "4",
number = "1",
pages = "43--49",
month = jan,
year = "1980",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-117991853783",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:29 MDT 2008",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902775~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "IV",
}
@Article{Kruh:1980:RMC,
author = "Louis Kruh",
title = "Reminiscences of a Master Cryptologist",
journal = j-CRYPTOLOGIA,
volume = "4",
number = "1",
pages = "45--50",
month = jan,
year = "1980",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118091854852",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:29 MDT 2008",
bibsource = "http://ourworld.compuserve.com/homepages/crypto/BIBALL.HTM;
http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902866~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "IV",
xxtitle = "Reminiscences of Master Cryptograph",
}
@Article{Eckler:1980:SCU,
author = "A. Ross Eckler",
title = "Some Comments on the Use of the {HP 67/97} as a
Cryptograph",
journal = j-CRYPTOLOGIA,
volume = "4",
number = "1",
pages = "51--53",
month = jan,
year = "1980",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118091854861",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:29 MDT 2008",
bibsource = "http://ourworld.compuserve.com/homepages/crypto/BIBALL.HTM;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902867~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "IV",
}
@Article{Winkel:1980:TTa,
author = "Brian J. Winkel",
title = "There and There",
journal = j-CRYPTOLOGIA,
volume = "4",
number = "1",
pages = "54--61",
month = jan,
year = "1980",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118091854870",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:29 MDT 2008",
bibsource = "http://ourworld.compuserve.com/homepages/crypto/BIBALL.HTM;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902868~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "IV",
}
@Article{Anonymous:1980:BCa,
author = "Anonymous",
title = "Biographies of Contributors",
journal = j-CRYPTOLOGIA,
volume = "4",
number = "1",
pages = "62--63",
month = jan,
year = "1980",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118091854889",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:29 MDT 2008",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902869~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "IV",
}
@Article{Kahn:1980:IC,
author = "David Kahn",
title = "Interviews With Cryptologists",
journal = j-CRYPTOLOGIA,
volume = "4",
number = "2",
pages = "65--70",
month = apr,
year = "1980",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118091854898",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:30 MDT 2008",
bibsource = "http://ourworld.compuserve.com/homepages/crypto/BIBALL.HTM;
http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902872~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "IV",
}
@Article{Levine:1980:ADIa,
author = "Jack Levine and Robert E. Hartwig",
title = "Applications of the {Drazin} inverse to the {Hill}
cryptographic system. {Part I}",
journal = j-CRYPTOLOGIA,
volume = "4",
number = "2",
pages = "71--85",
month = apr,
year = "1980",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118091854906",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
MRclass = "94B99",
MRnumber = "81d:94028",
bibdate = "Mon Jun 30 15:38:30 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902873~db=all~order=page",
ZMnumber = "427.94015",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "IV",
}
@Article{Shulman:1980:CCC,
author = "David Shulman",
title = "A Curious Cryptic Composition",
journal = j-CRYPTOLOGIA,
volume = "4",
number = "2",
pages = "86--88",
month = apr,
year = "1980",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118091854915",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:30 MDT 2008",
bibsource = "http://ourworld.compuserve.com/homepages/crypto/BIBALL.HTM;
http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902874~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "IV",
}
@Article{Outerbridge:1980:SCC,
author = "Richard Outerbridge",
title = "Some Cryptographic and Computing Applications of the
{Toshiba LC-836MN Memo Note 30} Pocket Calculator",
journal = j-CRYPTOLOGIA,
volume = "4",
number = "2",
pages = "89--94",
month = apr,
year = "1980",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118091854924",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:30 MDT 2008",
bibsource = "http://ourworld.compuserve.com/homepages/crypto/BIBALL.HTM;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902875~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "IV",
}
@Article{Anonymous:1980:RML,
author = "Anonymous",
title = "Ready-Made Love Letters",
journal = j-CRYPTOLOGIA,
volume = "4",
number = "2",
pages = "95--95",
month = apr,
year = "1980",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118091854933",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:30 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902876~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "IV",
}
@Article{Arnold:1980:AJS,
author = "Philip M. Arnold",
title = "An apology for {Jacopo Silvestri}",
journal = j-CRYPTOLOGIA,
volume = "4",
number = "2",
pages = "96--103",
month = apr,
year = "1980",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118091854942",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
MRclass = "01A40",
MRnumber = "82e:01026",
MRreviewer = "Garry J. Tee",
bibdate = "Mon Jun 30 15:38:30 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902877~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "IV",
}
@Article{Raven:1980:MPB,
author = "Francis A. Raven",
title = "{``Memories of the Pacific''}: Book Reviews",
journal = j-CRYPTOLOGIA,
volume = "4",
number = "2",
pages = "104--108",
month = apr,
year = "1980",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118091854951",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:30 MDT 2008",
bibsource = "http://ourworld.compuserve.com/homepages/crypto/BIBALL.HTM;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902878~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "IV",
}
@Article{Wall:1980:DSS,
author = "Rajendra S. Wall",
title = "Decryption of Simple Substitution Cyphers With Word
Divisions Using a Content Addressable Memory",
journal = j-CRYPTOLOGIA,
volume = "4",
number = "2",
pages = "109--115",
month = apr,
year = "1980",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118091854960",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:30 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902879~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "IV",
}
@Article{Gillogly:1980:BCD,
author = "James J. Gillogly",
title = "The {Beale Cypher}: a Dissenting Opinion",
journal = j-CRYPTOLOGIA,
volume = "4",
number = "2",
pages = "116--119",
month = apr,
year = "1980",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118091854979",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:30 MDT 2008",
bibsource = "http://ourworld.compuserve.com/homepages/crypto/BIBALL.HTM;
http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902880~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
remark = "From
\path=http://www.wolfram.com/~lou/puzzles/r.p.answers.framed/cryptologyA01.html=:
The Beale ciphers are one of the greatest unsolved
puzzles of all time. About 100 years ago, a fellow by
the name of Beale supposedly buried two wagons-full of
silver-coin filled pots in Bedford County, near
Roanoke. There are local rumors about the treasure
being buried near Bedford Lake.\par
He wrote three encoded letters telling what was buried,
where it was buried, and who it belonged to. He
entrusted these three letters to a friend and went
west. He was never heard from again.\par
Several years later, someone examined the letters and
was able to break the code used in the second letter.
The code used the text from the Declaration of
Independence. A number in the letter indicated which
word in the document was to be used. The first letter
of that word replaced the number. For example, if the
first three words of the document were ``We hold these
truths'', the number 3 in the letter would represent
the letter t.\par
One of the remaining letters supposedly contains
directions on how to find the treasure. to date, no one
has solved the code. It is believed that both of the
remaining letters are encoded using either the same
document in a different way, or another very public
document.",
romanvolume = "IV",
}
@Article{Kahn:1980:NAN,
author = "David Kahn",
title = "Nuggets from the Archives: a Null Code at the {White
House}",
journal = j-CRYPTOLOGIA,
volume = "4",
number = "2",
pages = "120--121",
month = apr,
year = "1980",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118091854988",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:30 MDT 2008",
bibsource = "http://ourworld.compuserve.com/homepages/crypto/BIBALL.HTM;
http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902881~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "IV",
}
@Article{Anonymous:1980:S,
author = "Anonymous",
title = "Solutions",
journal = j-CRYPTOLOGIA,
volume = "4",
number = "2",
pages = "122--122",
month = apr,
year = "1980",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118091854997",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:30 MDT 2008",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902882~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "IV",
}
@Article{Winkel:1980:SCC,
author = "Brian J. Winkel",
title = "Solution to Cryptanalysts' Corner {Scotch}
Homophonic",
journal = j-CRYPTOLOGIA,
volume = "4",
number = "2",
pages = "122--122",
month = apr,
year = "1980",
CODEN = "CRYPE6",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Nov 23 09:08:28 MST 1998",
bibsource = "http://ourworld.compuserve.com/homepages/crypto/BIBALL.HTM;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "IV",
}
@Article{Winkel:1980:TTb,
author = "Brian J. Winkel",
title = "There and There",
journal = j-CRYPTOLOGIA,
volume = "4",
number = "2",
pages = "123--126",
month = apr,
year = "1980",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118091855004",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:30 MDT 2008",
bibsource = "http://ourworld.compuserve.com/homepages/crypto/BIBALL.HTM;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902883~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "IV",
}
@Article{Anonymous:1980:BCb,
author = "Anonymous",
title = "Biographies of Contributors",
journal = j-CRYPTOLOGIA,
volume = "4",
number = "2",
pages = "127--128",
month = apr,
year = "1980",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118091855013",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:30 MDT 2008",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902884~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "IV",
}
@Article{Kruh:1980:CDT,
author = "Louis Kruh",
title = "Cipher Devices: {TRS-80} Data Privacy System",
journal = j-CRYPTOLOGIA,
volume = "4",
number = "2",
pages = "181--183",
month = apr,
year = "1980",
CODEN = "CRYPE6",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Sat Nov 21 12:35:16 MST 1998",
bibsource = "http://ourworld.compuserve.com/homepages/crypto/BIBALL.HTM;
http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "IV",
}
@Article{Deavours:1980:BCCa,
author = "Cipher A. Deavours",
title = "The {Black Chamber}: a column. {How} the {British}
broke {Enigma}",
journal = j-CRYPTOLOGIA,
volume = "4",
number = "3",
pages = "129--132",
month = jul,
year = "1980",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118091855022",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
MRclass = "01A60",
MRnumber = "83f:01025",
bibdate = "Mon Jun 30 15:38:31 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902886~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "IV",
}
@Article{Bright:1980:HSI,
author = "Herbert S. Bright",
title = "High-Speed Indirect Cryption",
journal = j-CRYPTOLOGIA,
volume = "4",
number = "3",
pages = "133--139",
month = jul,
year = "1980",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118091855031",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:31 MDT 2008",
bibsource = "http://ourworld.compuserve.com/homepages/crypto/BIBALL.HTM;
http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902887~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "IV",
}
@Article{Pady:1980:FCI,
author = "Donald S. Pady and Laura S. Kline",
title = "Finger counting and the identification of {James VI}'s
secret agents",
journal = j-CRYPTOLOGIA,
volume = "4",
number = "3",
pages = "140--149",
month = jul,
year = "1980",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118091855040",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
MRclass = "01A45 (10-03)",
MRnumber = "83e:01021",
MRreviewer = "J. V. Field",
bibdate = "Mon Jun 30 15:38:31 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902888~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "IV",
}
@Article{Levine:1980:ADIb,
author = "Jack Levine and Robert E. Hartwig",
title = "Applications of the {Drazin} Inverse to the {Hill}
Cryptographic System. {Part II}",
journal = j-CRYPTOLOGIA,
volume = "4",
number = "3",
pages = "150--168",
month = jul,
year = "1980",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118091855059",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
MRclass = "94B99",
MRnumber = "81j:94030",
bibdate = "Mon Jun 30 15:38:31 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902889~db=all~order=page",
ZMnumber = "444.94012",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "IV",
}
@Article{Barker:1980:OAC,
author = "Wayne G. Barker",
title = "Opportunities for the Amateur Cryptanalyst Can Be
Anywhere",
journal = j-CRYPTOLOGIA,
volume = "4",
number = "3",
pages = "169--172",
month = jul,
year = "1980",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118091855068",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:31 MDT 2008",
bibsource = "http://ourworld.compuserve.com/homepages/crypto/BIBALL.HTM;
http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902890~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "IV",
}
@Article{Kruh:1980:WDB,
author = "Louis Kruh",
title = "{``The Work of a Diplomat''}: a Book Review",
journal = j-CRYPTOLOGIA,
volume = "4",
number = "3",
pages = "172--172",
month = jul,
year = "1980",
CODEN = "CRYPE6",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Nov 23 09:08:28 MST 1998",
bibsource = "http://ourworld.compuserve.com/homepages/crypto/BIBALL.HTM;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "IV",
}
@Article{Kahn:1980:SCB,
author = "David Kahn",
title = "Spy Ciphers: a Book Review",
journal = j-CRYPTOLOGIA,
volume = "4",
number = "3",
pages = "173--176",
month = jul,
year = "1980",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118091855077",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:31 MDT 2008",
bibsource = "http://ourworld.compuserve.com/homepages/crypto/BIBALL.HTM;
http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902891~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "IV",
}
@Article{Knight:1980:CCb,
author = "H. Gary Knight",
title = "Cryptanalysts' Corner",
journal = j-CRYPTOLOGIA,
volume = "4",
number = "3",
pages = "177--180",
month = jul,
year = "1980",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118091855086",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:31 MDT 2008",
bibsource = "http://ourworld.compuserve.com/homepages/crypto/BIBALL.HTM;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902892~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "IV",
}
@Article{Kruh:1980:CDCb,
author = "Louis Kruh",
title = "Cipher Devices: a Column Cryptext {TRS-80} Data
Privacy System",
journal = j-CRYPTOLOGIA,
volume = "4",
number = "3",
pages = "181--183",
month = jul,
year = "1980",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118091855095",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:31 MDT 2008",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902893~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "IV",
}
@Article{Cooper:1980:LTG,
author = "R. H. Cooper",
title = "Linear transformations in {Galois} fields and their
application to cryptography",
journal = j-CRYPTOLOGIA,
volume = "4",
number = "3",
pages = "184--188",
month = jul,
year = "1980",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118091855103",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
MRclass = "12C99 (94B99)",
MRnumber = "82d:12012",
MRreviewer = "F. J. MacWilliams",
bibdate = "Mon Jun 30 15:38:31 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902894~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "IV",
}
@Article{Anonymous:1980:BCc,
author = "Anonymous",
title = "Biographies of Contributors",
journal = j-CRYPTOLOGIA,
volume = "4",
number = "3",
pages = "189--190",
month = jul,
year = "1980",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118091855112",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:31 MDT 2008",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902895~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "IV",
}
@Article{Ewing:1980:SSW,
author = "Sir Alfred Ewing",
title = "Some Special War Work: {Part I}",
journal = j-CRYPTOLOGIA,
volume = "4",
number = "4",
pages = "193--203",
month = oct,
year = "1980",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118091855121",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:31 MDT 2008",
bibsource = "http://ourworld.compuserve.com/homepages/crypto/BIBALL.HTM;
http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902897~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "IV",
}
@Article{Kochanski:1980:RLL,
author = "M. J. Kochanski",
title = "Remarks on {Lu} and {Lee}'s proposals for a public-key
cryptosystem",
journal = j-CRYPTOLOGIA,
volume = "4",
number = "4",
pages = "204--207",
month = oct,
year = "1980",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118091855130",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
MRclass = "94B99 (12C05)",
MRnumber = "82a:94089",
bibdate = "Mon Jun 30 15:38:31 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902898~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "IV",
}
@Article{Knight:1980:CCc,
author = "H. Gary Knight",
title = "Cryptanalysts' Corner",
journal = j-CRYPTOLOGIA,
volume = "4",
number = "4",
pages = "208--212",
month = oct,
year = "1980",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118091855149",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:31 MDT 2008",
bibsource = "http://ourworld.compuserve.com/homepages/crypto/BIBALL.HTM;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902899~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "IV",
}
@Article{Nelson:1980:DCC,
author = "Jim Nelson",
title = "The Development of Commercial Cryptosystem Standards",
journal = j-CRYPTOLOGIA,
volume = "4",
number = "4",
pages = "213--224",
month = oct,
year = "1980",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118091855158",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:31 MDT 2008",
bibsource = "http://ourworld.compuserve.com/homepages/crypto/BIBALL.HTM;
http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902900~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "IV",
}
@Article{Kruh:1980:CET,
author = "Louis Kruh",
title = "Cipher Equipment: {TST-1221}",
journal = j-CRYPTOLOGIA,
volume = "4",
number = "4",
pages = "225--229",
month = oct,
year = "1980",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118091855167",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:31 MDT 2008",
bibsource = "http://ourworld.compuserve.com/homepages/crypto/BIBALL.HTM;
http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902901~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "IV",
}
@Article{Makar:1980:TC,
author = "Boshra H. Makar",
title = "Transfinite Cryptography",
journal = j-CRYPTOLOGIA,
volume = "4",
number = "4",
pages = "230--237",
month = oct,
year = "1980",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118091855176",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
MRclass = "94B99 (15A99)",
MRnumber = "81g:94043",
bibdate = "Mon Jun 30 15:38:31 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902902~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "IV",
}
@Article{Kruh:1980:PHR,
author = "Louis Kruh",
title = "{``Pearl Harbor Revisited''}: a Book Review",
journal = j-CRYPTOLOGIA,
volume = "4",
number = "4",
pages = "237--237",
month = oct,
year = "1980",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118091855185",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:31 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
note = "See \cite{Love:1995:PHR}.",
URL = "http://www.informaworld.com/smpp/content~content=a741902903~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "IV",
}
@Article{Kahn:1980:PC,
author = "David Kahn",
title = "A Professional's Challenge",
journal = j-CRYPTOLOGIA,
volume = "4",
number = "4",
pages = "238--239",
month = oct,
year = "1980",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118091855194",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:31 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902904~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "IV",
}
@Article{Deavours:1980:BCCb,
author = "Cipher A. Deavours",
title = "The {Black Chamber}: a column --- la m{\'e}thode des
b{\^a}tons",
journal = j-CRYPTOLOGIA,
volume = "4",
number = "4",
pages = "240--247",
month = oct,
year = "1980",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118091855202",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
MRclass = "01A60",
MRnumber = "83h:01053",
bibdate = "Mon Jun 30 15:38:31 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902905~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "IV",
}
@Article{Kruh:1980:RVA,
author = "Louis Kruh",
title = "A Remarkable View of Ancient {America}: a Book
Review",
journal = j-CRYPTOLOGIA,
volume = "4",
number = "4",
pages = "248--249",
month = oct,
year = "1980",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118091855211",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:31 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902906~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "IV",
}
@Article{Anonymous:1980:RRS,
author = "Anonymous",
title = "Results of Reader Survey",
journal = j-CRYPTOLOGIA,
volume = "4",
number = "4",
pages = "250--251",
month = oct,
year = "1980",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118091855220",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:31 MDT 2008",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902907~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "IV",
}
@Article{Anonymous:1980:BCd,
author = "Anonymous",
title = "Biographies of Contributors",
journal = j-CRYPTOLOGIA,
volume = "4",
number = "4",
pages = "252--253",
month = oct,
year = "1980",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118091855239",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:31 MDT 2008",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902908~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "IV",
}
@Article{Mellen:1981:GSL,
author = "Greg Mellen",
title = "Graphic Solution of a Linear Transformation Cipher",
journal = j-CRYPTOLOGIA,
volume = "5",
number = "1",
pages = "1--19",
month = jan,
year = "1981",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118191855733",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:32 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902952~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "V",
}
@Article{Kahn:1981:PS,
author = "David Kahn",
title = "The Public's Secrets",
journal = j-CRYPTOLOGIA,
volume = "5",
number = "1",
pages = "20--26",
month = jan,
year = "1981",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118191855742",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:32 MDT 2008",
bibsource = "http://ourworld.compuserve.com/homepages/crypto/BIBALL.HTM;
http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902953~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "V",
}
@Article{Rivest:1981:SAH,
author = "Ronald L. Rivest",
title = "Statistical Analysis of the {Hagelin} Cryptograph",
journal = j-CRYPTOLOGIA,
volume = "5",
number = "1",
pages = "27--32",
month = jan,
year = "1981",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118191855751",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:32 MDT 2008",
bibsource = "http://ourworld.compuserve.com/homepages/crypto/BIBALL.HTM;
http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902954~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "V",
}
@Article{Ewing:1981:SSW,
author = "Sir Alfred Ewing",
title = "Some Special War Work, {Part II}",
journal = j-CRYPTOLOGIA,
volume = "5",
number = "1",
pages = "33--39",
month = jan,
year = "1981",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118191855760",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:32 MDT 2008",
bibsource = "http://ourworld.compuserve.com/homepages/crypto/BIBALL.HTM;
http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902955~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "V",
}
@Article{Mellen:1981:CCa,
author = "Greg Mellen",
title = "Cryptanalysts' Corner",
journal = j-CRYPTOLOGIA,
volume = "5",
number = "1",
pages = "40--42",
month = jan,
year = "1981",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118191855779",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:32 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902956~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "V",
}
@Article{Deavours:1981:BCC,
author = "Cipher A. Deavours",
title = "The {Black Chamber}: a Column Shutting Off the Spigot
in 1981",
journal = j-CRYPTOLOGIA,
volume = "5",
number = "1",
pages = "43--45",
month = jan,
year = "1981",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118191855788",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:32 MDT 2008",
bibsource = "http://ourworld.compuserve.com/homepages/crypto/BIBALL.HTM;
http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902957~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "V",
}
@Article{Kruh:1981:CEC,
author = "Louis Kruh",
title = "Cipher Equipment: {Collins CR-200/220} Data Security
Unit",
journal = j-CRYPTOLOGIA,
volume = "5",
number = "1",
pages = "46--50",
month = jan,
year = "1981",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118191855797",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:32 MDT 2008",
bibsource = "http://ourworld.compuserve.com/homepages/crypto/BIBALL.HTM;
http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902958~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "V",
}
@Article{Rubin:1981:DSC,
author = "Frank Rubin",
title = "Decrypting a Stream Cipher Based on {J--K}
Flip-Flops",
journal = j-CRYPTOLOGIA,
volume = "5",
number = "1",
pages = "51--57",
month = jan,
year = "1981",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118191855805",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:32 MDT 2008",
bibsource = "http://ourworld.compuserve.com/homepages/crypto/BIBALL.HTM;
http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
note = "Originally published in IEEE Transactions on
Computers. C-28(7): 483--487, 1979. Reprinted in
\cite[283--293]{Deavours:1987:CYT}.",
URL = "http://www.informaworld.com/smpp/content~content=a741902959~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "V",
}
@Article{Kruh:1981:UCB,
author = "Louis Kruh",
title = "{``From the Ultra Conference''}: a Book Review",
journal = j-CRYPTOLOGIA,
volume = "5",
number = "1",
pages = "58--58",
month = jan,
year = "1981",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118191855814",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:32 MDT 2008",
bibsource = "http://ourworld.compuserve.com/homepages/crypto/BIBALL.HTM;
http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902960~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "V",
}
@Article{Fischer:1981:TMC,
author = "Elliot Fischer",
title = "A Theoretical Measure of Cryptographic Performance",
journal = j-CRYPTOLOGIA,
volume = "5",
number = "1",
pages = "59--62",
month = jan,
year = "1981",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118191855823",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
MRclass = "94B99 (68C99)",
MRnumber = "82i:94033",
bibdate = "Mon Jun 30 15:38:32 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
note = "Reprinted in \cite[pp. 426--426]{Deavours:1987:CYT}.",
URL = "http://www.informaworld.com/smpp/content~content=a741902961~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "V",
xxauthor = "Elliott Fischer",
}
@Article{Anonymous:1981:BCa,
author = "Anonymous",
title = "Biographies of Contributors",
journal = j-CRYPTOLOGIA,
volume = "5",
number = "1",
pages = "63--63",
month = jan,
year = "1981",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118191855832",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:32 MDT 2008",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902962~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "V",
}
@Article{Kahn:1981:GSC,
author = "David Kahn",
title = "{German} Spy Cryptograms",
journal = j-CRYPTOLOGIA,
volume = "5",
number = "2",
pages = "65--66",
month = apr,
year = "1981",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118191855841",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:33 MDT 2008",
bibsource = "http://ourworld.compuserve.com/homepages/crypto/BIBALL.HTM;
http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902965~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "V",
}
@Article{Hartwig:1981:ADIa,
author = "Robert E. Hartwig and Jack Levine",
title = "Applications of the {Drazin} inverse to the {Hill}
cryptographic system. {Part III}",
journal = j-CRYPTOLOGIA,
volume = "5",
number = "2",
pages = "67--77",
month = apr,
year = "1981",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118191855850",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
MRclass = "94B99",
MRnumber = "82j:94022a",
bibdate = "Mon Jun 30 15:38:33 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902966~db=all~order=page",
ZMnumber = "491.94015",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "V",
}
@Article{Kallis:1981:CGC,
author = "Stephen A. {Kallis, Jr.}",
title = "The {Code-O-Graph} Cipher Disks",
journal = j-CRYPTOLOGIA,
volume = "5",
number = "2",
pages = "78--83",
month = apr,
year = "1981",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118191855869",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:33 MDT 2008",
bibsource = "http://ourworld.compuserve.com/homepages/crypto/BIBALL.HTM;
http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902967~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "V",
}
@Article{Sturges:1981:HRP,
author = "Gerald Sturges",
title = "The {House Report on Public Cryptography}",
journal = j-CRYPTOLOGIA,
volume = "5",
number = "2",
pages = "84--93",
month = apr,
year = "1981",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118191855878",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:33 MDT 2008",
bibsource = "http://ourworld.compuserve.com/homepages/crypto/BIBALL.HTM;
http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902968~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "V",
}
@Article{Costas:1981:HHC,
author = "John P. Costas",
title = "The Hand-Held Calculator As a Cryptographic Machine",
journal = j-CRYPTOLOGIA,
volume = "5",
number = "2",
pages = "94--117",
month = apr,
year = "1981",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118191855887",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:33 MDT 2008",
bibsource = "http://ourworld.compuserve.com/homepages/crypto/BIBALL.HTM;
http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902969~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "V",
}
@Article{Lembart:1981:PCS,
author = "Lee Lembart",
title = "The {Public Cryptography Study Group}: {U.S.} and
Mathematicians in Code Dispute",
journal = j-CRYPTOLOGIA,
volume = "5",
number = "2",
pages = "118--122",
month = apr,
year = "1981",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118191855896",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:33 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902970~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "V",
}
@Article{Mellen:1981:CCb,
author = "Greg Mellen",
title = "Cryptanalysts' Corner",
journal = j-CRYPTOLOGIA,
volume = "5",
number = "2",
pages = "123--123",
month = apr,
year = "1981",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118191855904",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:33 MDT 2008",
bibsource = "http://ourworld.compuserve.com/homepages/crypto/BIBALL.HTM;
http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902971~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "V",
}
@Article{Kruh:1981:CPB,
author = "Louis Kruh",
title = "{``A Code Problem''}: a Book Review",
journal = j-CRYPTOLOGIA,
volume = "5",
number = "2",
pages = "124--125",
month = apr,
year = "1981",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118191855913",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:33 MDT 2008",
bibsource = "http://ourworld.compuserve.com/homepages/crypto/BIBALL.HTM;
http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902972~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "V",
}
@Article{Anonymous:1981:BCb,
author = "Anonymous",
title = "Biographies of Contributors",
journal = j-CRYPTOLOGIA,
volume = "5",
number = "2",
pages = "126--126",
month = apr,
year = "1981",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118191855922",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:33 MDT 2008",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902973~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "V",
}
@Article{Anonymous:1981:RPC,
author = "Anonymous",
title = "Report of the {Public Cryptography Study Group}",
journal = j-CRYPTOLOGIA,
volume = "5",
number = "3",
pages = "130--142",
month = jul,
year = "1981",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118191855931",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:33 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902975~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "V",
}
@Article{Davida:1981:CAR,
author = "George I. Davida",
title = "The Case Against Restraints on Non-Governmental
Research in Cryptography",
journal = j-CRYPTOLOGIA,
volume = "5",
number = "3",
pages = "143--148",
month = jul,
year = "1981",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118191855940",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:33 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902976~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "V",
}
@Article{Arnold:1981:PBC,
author = "Philip M. Arnold",
title = "{Palatino} and {Bibliander} on ciphers",
journal = j-CRYPTOLOGIA,
volume = "5",
number = "3",
pages = "149--154",
month = jul,
year = "1981",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118191855959",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
MRclass = "01A40",
MRnumber = "84j:01027",
MRreviewer = "M. Folkerts",
bibdate = "Mon Jun 30 15:38:33 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902977~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "V",
xxtitle = "{Palatino} and {Biblianber} on Ciphers",
xxtitle = "{Palatina} and {Bibliander} on ciphers",
}
@Article{Kruh:1981:RRD,
author = "Louis Kruh",
title = "{``Reward for Reading and Deciphering''}: a Book
Review",
journal = j-CRYPTOLOGIA,
volume = "5",
number = "3",
pages = "155--157",
month = jul,
year = "1981",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118191855968",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:33 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902978~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "V",
}
@Article{Fischer:1981:MCP,
author = "Elliot Fischer",
title = "Measuring Cryptographic Performance With Production
Processes",
journal = j-CRYPTOLOGIA,
volume = "5",
number = "3",
pages = "158--162",
month = jul,
year = "1981",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118191855977",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:33 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902979~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "V",
}
@Article{Buck:1981:SHB,
author = "R. Creighton Buck",
title = "{Sherlock Holmes} in {Babylon}",
journal = j-CRYPTOLOGIA,
volume = "5",
number = "3",
pages = "163--173",
month = jul,
year = "1981",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118191855986",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
MRclass = "01A17 (10A30)",
MRnumber = "82i:01005",
bibdate = "Mon Jun 30 15:38:33 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902980~db=all~order=page",
ZMnumber = "502.01002",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "V",
}
@Article{Kruh:1981:CME,
author = "Louis Kruh",
title = "Cipher Machine Exhibit at the {Smithsonian
Institution}",
journal = j-CRYPTOLOGIA,
volume = "5",
number = "3",
pages = "174--174",
month = jul,
year = "1981",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118191855995",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:33 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902981~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "V",
xxtitle = "Cipher Machine Exhibit at {Smithsonian Institution}",
}
@Article{Stuerzinger:1981:C,
author = "Oskar Stuerzinger",
title = "The {A-22} Cryptograph",
journal = j-CRYPTOLOGIA,
volume = "5",
number = "3",
pages = "175--183",
month = jul,
year = "1981",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118191856002",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:33 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902982~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "V",
}
@Article{Winkel:1981:TT,
author = "Brian J. Winkel",
title = "There and There",
journal = j-CRYPTOLOGIA,
volume = "5",
number = "3",
pages = "184--190",
month = jul,
year = "1981",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118191856011",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:33 MDT 2008",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902983~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "V",
}
@Article{Anonymous:1981:BCc,
author = "Anonymous",
title = "Biographies of Contributors",
journal = j-CRYPTOLOGIA,
volume = "5",
number = "3",
pages = "191--191",
month = jul,
year = "1981",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118191856020",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:33 MDT 2008",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902984~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "V",
}
@Article{Kahn:1981:GJB,
author = "David Kahn",
title = "The Genesis of the {Jefferson\slash Bazeries} Cipher
Device",
journal = j-CRYPTOLOGIA,
volume = "5",
number = "4",
pages = "193--208",
month = oct,
year = "1981",
CODEN = "CRYPE6",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Sat Nov 21 12:35:16 MST 1998",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "V",
}
@Article{Kruh:1981:GJB,
author = "Louis Kruh",
title = "The Genesis of the {Jefferson\slash Bazeries} Cipher
Device",
journal = j-CRYPTOLOGIA,
volume = "5",
number = "4",
pages = "193--208",
month = oct,
year = "1981",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118191856039",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:34 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902986~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "V",
xxtitle = "The Genesis of the {Jefferson\slash Bazeries} Cipher
Devices",
}
@Article{Kruh:1981:UGV,
author = "Louis Kruh",
title = "{``A User's Guide in Voice and Data Communications
Protection''}: Book Review",
journal = j-CRYPTOLOGIA,
volume = "5",
number = "4",
pages = "208--212",
month = oct,
year = "1981",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118191856048",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:34 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902987~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "V",
}
@Article{Klingler:1981:LE,
author = "L. Klingler",
title = "Letter to the {Editor}",
journal = j-CRYPTOLOGIA,
volume = "5",
number = "4",
pages = "209--210",
month = oct,
year = "1981",
CODEN = "CRYPE6",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Sat Nov 21 12:35:16 MST 1998",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "V",
}
@Article{Costas:1981:LE,
author = "J. Costas",
title = "Letter to the {Editor}",
journal = j-CRYPTOLOGIA,
volume = "5",
number = "4",
pages = "210--212",
month = oct,
year = "1981",
CODEN = "CRYPE6",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Sat Nov 21 12:35:16 MST 1998",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "V",
}
@Article{Hartwig:1981:ADIb,
author = "Robert E. Hartwig and Jack Levine",
title = "Applications of the {Drazin} Inverse to the {Hill}
Cryptographic System. {Part IV}",
journal = j-CRYPTOLOGIA,
volume = "5",
number = "4",
pages = "213--228",
month = oct,
year = "1981",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118191856057",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
MRclass = "94B99",
MRnumber = "82j:94022b",
bibdate = "Mon Jun 30 15:38:34 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902988~db=all~order=page",
ZMnumber = "491.94016",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "V",
}
@Article{Groth:1981:SWE,
author = "William Groth",
title = "Secret Writing Exhibit",
journal = j-CRYPTOLOGIA,
volume = "5",
number = "4",
pages = "229--230",
month = oct,
year = "1981",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118191856066",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:34 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902989~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "V",
}
@Article{Hammer:1981:HOH,
author = "Carl Hammer",
title = "Higher-Order Homophonic Ciphers",
journal = j-CRYPTOLOGIA,
volume = "5",
number = "4",
pages = "231--242",
month = oct,
year = "1981",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118191856075",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:34 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902990~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "V",
}
@Article{Wolf:1981:NTD,
author = "Jack Keil Wolf",
title = "{``Number Theory in Digital Signal Processing''}: a
Book Review",
journal = j-CRYPTOLOGIA,
volume = "5",
number = "4",
pages = "243--246",
month = oct,
year = "1981",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118191856084",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:34 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
note = "See \cite{McClellan:1979:NTD}.",
URL = "http://www.informaworld.com/smpp/content~content=a741902991~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "V",
}
@Article{Deavours:1981:ISC,
author = "C. A. Deavours",
title = "Interactive Solution of Columnar Transposition
Ciphers",
journal = j-CRYPTOLOGIA,
volume = "5",
number = "4",
pages = "247--251",
month = oct,
year = "1981",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118191856093",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:34 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902992~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "V",
}
@Article{Anonymous:1981:BCd,
author = "Anonymous",
title = "Biographies of Contributors",
journal = j-CRYPTOLOGIA,
volume = "5",
number = "4",
pages = "252--253",
month = oct,
year = "1981",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118191856101",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:34 MDT 2008",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902993~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "V",
}
@Article{Unknown:1981:LE,
author = "Unknown",
title = "Letters to the {Editor}",
journal = j-CRYPTOLOGIA,
volume = "5",
number = "4",
pages = "??--??",
month = oct,
year = "1981",
CODEN = "CRYPE6",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Sat Nov 21 12:35:16 MST 1998",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "V",
}
@Article{Rejewski:1982:MSE,
author = "Marian Rejewski",
title = "Mathematical Solution of the {Enigma} Cipher",
journal = j-CRYPTOLOGIA,
volume = "6",
number = "1",
pages = "1--18",
month = jan,
year = "1982",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118291856731",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
MRclass = "01A60 (20-03)",
MRnumber = "84c:01049",
bibdate = "Mon Jun 30 15:38:35 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
note = "Translated from the Polish by Christopher Kasparek.",
URL = "http://www.informaworld.com/smpp/content~content=a741903044~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "VI",
}
@Article{Kasparek:1982:MMR,
author = "Christopher Kasparek and Richard A. Woytak",
title = "In memoriam {Marian Rejewski}",
journal = j-CRYPTOLOGIA,
volume = "6",
number = "1",
pages = "19--25",
month = jan,
year = "1982",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118291856740",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
MRclass = "01A70",
MRnumber = "84c:01057",
bibdate = "Mon Jun 30 15:38:35 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741903045~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "VI",
}
@Article{Kahn:1982:WGL,
author = "David Kahn",
title = "Why {Germany} Lost the Code War",
journal = j-CRYPTOLOGIA,
volume = "6",
number = "1",
pages = "26--31",
month = jan,
year = "1982",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118291856759",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:35 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741903046~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "VI",
}
@Article{Kozaczuk:1982:ES,
author = "Wldyslaw Kozaczuk",
title = "{Enigma} Solved",
journal = j-CRYPTOLOGIA,
volume = "6",
number = "1",
pages = "32--33",
month = jan,
year = "1982",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118291856768",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:35 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741903047~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "VI",
}
@Article{Deavours:1982:BC,
author = "C. A. Deavours",
title = "The {Black Chamber}",
journal = j-CRYPTOLOGIA,
volume = "6",
number = "1",
pages = "34--37",
month = jan,
year = "1982",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118291856777",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:35 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741903048~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "VI",
}
@Article{Kruh:1982:WMB,
author = "Louis Kruh",
title = "{`Wilderness of Mirrors''}: a Book Review",
journal = j-CRYPTOLOGIA,
volume = "6",
number = "1",
pages = "38--38",
month = jan,
year = "1982",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118291856786",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:35 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
note = "See \cite{Martin:2003:WMI}.",
URL = "http://www.informaworld.com/smpp/content~content=a741903049~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "VI",
}
@Article{Kruh:1982:BSM,
author = "Louis Kruh",
title = "{``Beale Society Material''}: Book Reviews",
journal = j-CRYPTOLOGIA,
volume = "6",
number = "1",
pages = "39--39",
month = jan,
year = "1982",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118291856795",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:35 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741903050~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "VI",
}
@Article{Anderson:1982:IR,
author = "Ralph V. Anderson",
title = "If {I} Remember",
journal = j-CRYPTOLOGIA,
volume = "6",
number = "1",
pages = "40--44",
month = jan,
year = "1982",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118291856803",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:35 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741903051~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "VI",
}
@Article{Mellen:1982:CCa,
author = "Greg Mellen",
title = "Cryptanalysts' Corner",
journal = j-CRYPTOLOGIA,
volume = "6",
number = "1",
pages = "45--46",
month = jan,
year = "1982",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118291856812",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:35 MDT 2008",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741903052~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "VI",
}
@Article{Kahn:1982:CPI,
author = "David Kahn",
title = "{Churchill} Pleads for the Intercepts",
journal = j-CRYPTOLOGIA,
volume = "6",
number = "1",
pages = "47--49",
month = jan,
year = "1982",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118291856821",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:35 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741903053~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "VI",
}
@Article{Woytak:1982:CMR,
author = "Richard A. Woytak",
title = "A Conversation With {Marian Rejewski}",
journal = j-CRYPTOLOGIA,
volume = "6",
number = "1",
pages = "50--60",
month = jan,
year = "1982",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118291856830",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:35 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741903054~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "VI",
}
@Article{Hardie:1982:UES,
author = "Bradford Hardie",
title = "{``Unraveling the Enigma Story''}: a Book Review",
journal = j-CRYPTOLOGIA,
volume = "6",
number = "1",
pages = "61--64",
month = jan,
year = "1982",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118291856849",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:35 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741903055~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "VI",
}
@Article{Bundy:1982:DHB,
author = "William P. Bundy",
title = "{``From the Depths to the Heights''}: Book Reviews",
journal = j-CRYPTOLOGIA,
volume = "6",
number = "1",
pages = "65--74",
month = jan,
year = "1982",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118291856858",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:35 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741903056~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "VI",
}
@Article{Rejewski:1982:RAB,
author = "Marian Rejewski",
title = "Remarks on Appendix 1 to {``British Intelligence in
the Second World War''} by {F. H. Hinsley}",
journal = j-CRYPTOLOGIA,
volume = "6",
number = "1",
pages = "75--83",
month = jan,
year = "1982",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118291856867",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:35 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741903057~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "VI",
}
@Article{Kahn:1982:CCB,
author = "David Kahn",
title = "{``Computer Cryptography''}: a Book Review",
journal = j-CRYPTOLOGIA,
volume = "6",
number = "1",
pages = "84--84",
month = jan,
year = "1982",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118291856876",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:35 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741903058~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "VI",
}
@Article{Kruh:1982:NCB,
author = "Louis Kruh",
title = "The {Navy} Cipher Box {Mark II}",
journal = j-CRYPTOLOGIA,
volume = "6",
number = "1",
pages = "85--93",
month = jan,
year = "1982",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118291856885",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:35 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741903059~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "VI",
}
@Article{Anonymous:1982:BCa,
author = "Anonymous",
title = "Biographies of Contributors",
journal = j-CRYPTOLOGIA,
volume = "6",
number = "1",
pages = "94--95",
month = jan,
year = "1982",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118291856894",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:35 MDT 2008",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741903060~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "VI",
}
@Article{Barclay:1982:UMS,
author = "Mel L. Barclay and Joshua S. Barclay",
title = "Use of Microcomputer System for Medical Record
Encryption and Decryption Using a Sequential
Pseudo-Random Key",
journal = j-CRYPTOLOGIA,
volume = "6",
number = "2",
pages = "97--107",
month = apr,
year = "1982",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118291856902",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:35 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741903063~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "VI",
}
@Article{Fischer:1982:PHT,
author = "Elliot Fischer",
title = "The Performance of {Hellman}'s Time-Memory Trade-Off
Against Some Rotor Ciphers",
journal = j-CRYPTOLOGIA,
volume = "6",
number = "2",
pages = "108--114",
month = apr,
year = "1982",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118291856911",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:35 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741903064~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "VI",
}
@Article{Kahn:1982:NSH,
author = "David Kahn",
title = "A New Source for Historians: {Yardley}'s Seized
Manuscript",
journal = j-CRYPTOLOGIA,
volume = "6",
number = "2",
pages = "115--119",
month = apr,
year = "1982",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118291856920",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:35 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741903065~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "VI",
}
@Article{Kahn:1982:MGJ,
author = "David Kahn",
title = "In Memoriam: {Georges-Jean Painvin}",
journal = j-CRYPTOLOGIA,
volume = "6",
number = "2",
pages = "120--127",
month = apr,
year = "1982",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118291856939",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:35 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741903066~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "VI",
}
@Article{Sloane:1982:ECCa,
author = "N. J. A. Sloane",
title = "Error-Correcting Codes and Cryptography. {Part I}",
journal = j-CRYPTOLOGIA,
volume = "6",
number = "2",
pages = "128--153",
month = apr,
year = "1982",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118291856948",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
MRclass = "94-02 (12C99 94B20)",
MRnumber = "84j:94003a",
MRreviewer = "J. S. Joel",
bibdate = "Mon Jun 30 15:38:35 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
note = "Originally published in {\em The Mathematical
Gardner}, D. A. Klarner (editor), Prindle, Weber \&
Schmidt, Boston, MA, 1981, pp. 346--382.",
URL = "http://www.informaworld.com/smpp/content~content=a741903067~db=all~order=page",
ZMnumber = "486.94002",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "VI",
}
@Article{Kruh:1982:BRB,
author = "Louis Kruh",
title = "Book Reviews: a Book With a Book Cipher",
journal = j-CRYPTOLOGIA,
volume = "6",
number = "2",
pages = "154--168",
month = apr,
year = "1982",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118291856957",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:35 MDT 2008",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741903068~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "VI",
}
@Article{Mellen:1982:CCb,
author = "Greg Mellen",
title = "Cryptanalysts' Corner",
journal = j-CRYPTOLOGIA,
volume = "6",
number = "2",
pages = "169--174",
month = apr,
year = "1982",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118291856966",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:35 MDT 2008",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741903069~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "VI",
}
@Article{Deavours:1982:KCP,
author = "C. A. Deavours",
title = "{Konheim's ``Cryptography --- A Primer''}: a Book
Review",
journal = j-CRYPTOLOGIA,
volume = "6",
number = "2",
pages = "175--176",
month = apr,
year = "1982",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118291856975",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:35 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
note = "See \cite{Konheim:1981:CP}.",
URL = "http://www.informaworld.com/smpp/content~content=a741903070~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "VI",
}
@Article{Kaiserling:1982:S,
author = "M. C. W. Kaiserling",
title = "{Sirius}",
journal = j-CRYPTOLOGIA,
volume = "6",
number = "2",
pages = "177--178",
month = apr,
year = "1982",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118291856984",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:35 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741903071~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "VI",
}
@Article{Winkel:1982:TTC,
author = "Brian J. Winkel",
title = "There and There --- a Column",
journal = j-CRYPTOLOGIA,
volume = "6",
number = "2",
pages = "179--188",
month = apr,
year = "1982",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118291856993",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:35 MDT 2008",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741903072~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "VI",
}
@Article{Anonymous:1982:BCb,
author = "Anonymous",
title = "Biographies of Contributors",
journal = j-CRYPTOLOGIA,
volume = "6",
number = "2",
pages = "189--190",
month = apr,
year = "1982",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118291857000",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:35 MDT 2008",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741903073~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "VI",
}
@Article{Tucker:1982:RPNa,
author = "Dundas P. Tucker",
title = "Rhapsody in {Purple}: a New History of {Pearl Harbor}
--- {I}",
journal = j-CRYPTOLOGIA,
volume = "6",
number = "3",
pages = "193--228",
month = jul,
year = "1982",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118291857019",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:36 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741903075~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "VI",
}
@Article{Berkovits:1982:FS,
author = "Shimshon Berkovits",
title = "Factoring via superencryption",
journal = j-CRYPTOLOGIA,
volume = "6",
number = "3",
pages = "229--237",
month = jul,
year = "1982",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118291857028",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
MRclass = "94B99",
MRnumber = "83g:94034",
bibdate = "Mon Jun 30 15:38:36 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib;
Theory/crypto.security.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741903076~db=all~order=page",
ZMnumber = "503.94020",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "VI",
}
@Article{Kruh:1982:MCD,
author = "Louis Kruh",
title = "The Mystery of {Colonel Decius Wadsworth}'s Cipher
Device",
journal = j-CRYPTOLOGIA,
volume = "6",
number = "3",
pages = "238--247",
month = jul,
year = "1982",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118291857037",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:36 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741903077~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "VI",
}
@Article{Mellen:1982:CCc,
author = "Greg Mellen",
title = "Cryptanalysts' Corner",
journal = j-CRYPTOLOGIA,
volume = "6",
number = "3",
pages = "248--252",
month = jul,
year = "1982",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118291857046",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:36 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741903078~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "VI",
}
@Article{Outerbridge:1982:CFU,
author = "Richard Outerbridge",
title = "Cryptographic Features of the {UNIX} Operating
System",
journal = j-CRYPTOLOGIA,
volume = "6",
number = "3",
pages = "253--257",
month = jul,
year = "1982",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118291857055",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:36 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/resource/pubs/cryptolo/index.htm;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib;
http://www.math.utah.edu/pub/tex/bib/unix.bib",
URL = "http://www.cs.bell-labs.com/~dmr/crypt.html;
http://www.informaworld.com/smpp/content~content=a741903079~db=all~order=page;
https://www.tandfonline.com/doi/abs/10.1080/0161-118291857055",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "VI",
}
@Article{Sloane:1982:ECCb,
author = "N. J. A. Sloane",
title = "Error-Correcting Codes and Cryptography. {Part II}",
journal = j-CRYPTOLOGIA,
volume = "6",
number = "3",
pages = "258--278",
month = jul,
year = "1982",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118291857064",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
MRclass = "94-02 (12C99 94B20)",
MRnumber = "84j:94003b",
MRreviewer = "J. S. Joel",
bibdate = "Mon Jun 30 15:38:36 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
note = "Originally published in {\em The Mathematical
Gardner}, D. A. Klarner (editor), Prindle, Weber \&
Schmidt, Boston, MA, 1981, pp. 346--382.",
URL = "http://www.informaworld.com/smpp/content~content=a741903080~db=all~order=page",
ZMnumber = "486.94002",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "VI",
}
@Article{Miller:1982:COA,
author = "Donald V. Miller",
title = "Ciphertext Only Attack on the {Merkle--Hellman}
Public-Key System under Broadcast Situations",
journal = j-CRYPTOLOGIA,
volume = "6",
number = "3",
pages = "279--281",
month = jul,
year = "1982",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118291857073",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:36 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741903081~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "VI",
}
@Article{Kaiserling:1982:SSM,
author = "M. C. W. Kaiserling",
title = "Solution to {Sirius} Music Cipher",
journal = j-CRYPTOLOGIA,
volume = "6",
number = "3",
pages = "282--282",
month = jul,
year = "1982",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118291857082",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:36 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741903082~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "VI",
}
@Article{Deavours:1982:HK,
author = "C. A. Deavours",
title = "{Helmich} and the {KL-7}",
journal = j-CRYPTOLOGIA,
volume = "6",
number = "3",
pages = "283--284",
month = jul,
year = "1982",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118291857091",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:36 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741903083~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "VI",
}
@Article{Anonymous:1982:BCc,
author = "Anonymous",
title = "Biographies of Contributors",
journal = j-CRYPTOLOGIA,
volume = "6",
number = "3",
pages = "285--286",
month = jul,
year = "1982",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118291857109",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:36 MDT 2008",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741903084~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "VI",
}
@Article{Davies:1982:SHT,
author = "Donald W. Davies",
title = "The {Siemens and Halske T52E} Cipher Machine",
journal = j-CRYPTOLOGIA,
volume = "6",
number = "4",
pages = "289--308",
month = oct,
year = "1982",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118291857118",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:37 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741903086~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "VI",
}
@Article{Mellen:1982:CCd,
author = "Greg Mellen",
title = "Cryptanalysts' Corner",
journal = j-CRYPTOLOGIA,
volume = "6",
number = "4",
pages = "309--311",
month = oct,
year = "1982",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118291857127",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:37 MDT 2008",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741903087~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "VI",
}
@Article{Akritas:1982:AVT,
author = "Alkiviadis G. Akritas",
title = "Application of {Vincent's Theorem} in Cryptography or
One-Time Pads Made Practical",
journal = j-CRYPTOLOGIA,
volume = "6",
number = "4",
pages = "312--318",
month = oct,
year = "1982",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118291857136",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:37 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741903088~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "VI",
}
@Article{Vahle:1982:BPR,
author = "M. O. Vahle and L. F. Tolendino",
title = "Breaking a Pseudo Random Number Based Cryptographic
Algorithm",
journal = j-CRYPTOLOGIA,
volume = "6",
number = "4",
pages = "319--328",
month = oct,
year = "1982",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118291857145",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:37 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741903089~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "VI",
}
@Article{Meijer:1982:DSS,
author = "Henk Meijer and Selim Akl",
title = "Digital Signature Schemes",
journal = j-CRYPTOLOGIA,
volume = "6",
number = "4",
pages = "329--338",
month = oct,
year = "1982",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118291857154",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:37 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741903090~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "VI",
}
@Article{Outerbridge:1982:PC,
author = "Richard Outerbridge",
title = "A Pedagogical Cipher",
journal = j-CRYPTOLOGIA,
volume = "6",
number = "4",
pages = "339--345",
month = oct,
year = "1982",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118291857163",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:37 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
note = "This paper is the winner of the Cryptologia First
Annual Undergraduate Paper Competition in Cryptology.",
URL = "http://www.informaworld.com/smpp/content~content=a741903091~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "VI",
}
@Article{Tucker:1982:RPNb,
author = "Dundas P. Tucker",
title = "Rhapsody in {Purple}: a New History of {Pearl Harbor}:
Part Two of Two",
journal = j-CRYPTOLOGIA,
volume = "6",
number = "4",
pages = "346--367",
month = oct,
year = "1982",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118291857172",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:37 MDT 2008",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741903092~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "VI",
}
@Article{Kallis:1982:CGC,
author = "Stephen A. Kallis",
title = "A Child's Garden of Cryptography",
journal = j-CRYPTOLOGIA,
volume = "6",
number = "4",
pages = "368--377",
month = oct,
year = "1982",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118291857181",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:37 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a757776453~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "VI",
}
@Article{Kruh:1982:BPB,
author = "Louis Kruh",
title = "A Basic Probe of the {Beale} Cipher as a
Bamboozlement",
journal = j-CRYPTOLOGIA,
volume = "6",
number = "4",
pages = "378--382",
month = oct,
year = "1982",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118291857190",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:37 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741903094~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "VI",
}
@Article{Anonymous:1982:BCd,
author = "Anonymous",
title = "Biographies of Contributors",
journal = j-CRYPTOLOGIA,
volume = "6",
number = "4",
pages = "383--384",
month = oct,
year = "1982",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118291857208",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:37 MDT 2008",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741903095~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "VI",
}
@Article{Kahn:1983:CCR,
author = "David Kahn",
title = "The {Crypto '82} Conference, a Report on [the]
Conference",
journal = j-CRYPTOLOGIA,
volume = "7",
number = "1",
pages = "1--5",
month = jan,
year = "1983",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118391857739",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:37 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902490~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "VII",
xxtitle = "The {Crypto '82 Conference, Santa Barbara}: a Report
on a Conference",
}
@Article{Mellen:1983:CCa,
author = "Greg Mellen",
title = "Cryptanalysts' Corner",
journal = j-CRYPTOLOGIA,
volume = "7",
number = "1",
pages = "6--11",
month = jan,
year = "1983",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118391857748",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:37 MDT 2008",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902491~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "VII",
}
@Article{Floyd:1983:ABC,
author = "Denis R. Floyd",
title = "Annotated bibliography in conventional and public key
cryptography",
journal = j-CRYPTOLOGIA,
volume = "7",
number = "1",
pages = "12--24",
month = jan,
year = "1983",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118391857757",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
MRclass = "00A15 (94Bxx)",
MRnumber = "85a:00011",
bibdate = "Mon Jun 30 15:38:37 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902492~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "VII",
}
@Article{Morris:1983:FCC,
author = "S. Brent Morris",
title = "Fraternal Cryptography: Cryptographic Practices of
{American} Fraternal Organizations",
journal = j-CRYPTOLOGIA,
volume = "7",
number = "1",
pages = "27--36",
month = jan,
year = "1983",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118391857766",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:37 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902493~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "VII",
}
@Article{Jurgensen:1983:LRU,
author = "H. Jurgensen",
title = "Language Redundancy and the Unicity Point",
journal = j-CRYPTOLOGIA,
volume = "7",
number = "1",
pages = "37--48",
month = jan,
year = "1983",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118391857775",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:37 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902494~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "VII",
}
@Article{Fak:1983:CPF,
author = "Viiveke Fak",
title = "Cryptographic Protection of Files in An Automated
Office System",
journal = j-CRYPTOLOGIA,
volume = "7",
number = "1",
pages = "49--62",
month = jan,
year = "1983",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118391857784",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:37 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902495~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "VII",
}
@Article{Makar:1983:ACC,
author = "Boshra H. Makar",
title = "Application of a certain class of infinite matrices to
the {Hill} cryptographic system",
journal = j-CRYPTOLOGIA,
volume = "7",
number = "1",
pages = "63--78",
month = jan,
year = "1983",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118391857793",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
MRclass = "94A60",
MRnumber = "85a:94024",
bibdate = "Mon Jun 30 15:38:37 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902496~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "VII",
}
@Article{Dyer:1983:PMB,
author = "Thomas H. Dyer",
title = "{``The Power of Magic''}: a Book Review",
journal = j-CRYPTOLOGIA,
volume = "7",
number = "1",
pages = "79--82",
month = jan,
year = "1983",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118391857801",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:37 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902497~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "VII",
}
@Article{Kruh:1983:CEC,
author = "Louis Kruh",
title = "Cipher Equipment: the Cryptographic Unit {CSI-10}",
journal = j-CRYPTOLOGIA,
volume = "7",
number = "1",
pages = "83--88",
month = jan,
year = "1983",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118391857810",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:37 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902498~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "VII",
}
@Article{Fischer:1983:UHC,
author = "Elliot Fischer",
title = "Uncaging the {Hagelin} Cryptograph",
journal = j-CRYPTOLOGIA,
volume = "7",
number = "1",
pages = "89--92",
month = jan,
year = "1983",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118391857829",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:37 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902499~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "VII",
}
@Article{Anonymous:1983:BCa,
author = "Anonymous",
title = "Biographies of Contributors",
journal = j-CRYPTOLOGIA,
volume = "7",
number = "1",
pages = "93--94",
month = jan,
year = "1983",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118391857838",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:37 MDT 2008",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902500~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "VII",
}
@Article{Lundstrom:1983:FRI,
author = "John B. Lundstrom",
title = "A Failure of Radio Intelligence: An Episode in the
{Battle of the Coral Sea}",
journal = j-CRYPTOLOGIA,
volume = "7",
number = "2",
pages = "97--118",
month = apr,
year = "1983",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118391857847",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:38 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902503~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "VII",
}
@Article{Clarke:1983:ASR,
author = "Brig. Gen. Carter W. Clarke",
title = "From the Archives: Statement for Record of
Participation of {Brig. Gen. Carter W. Clarke, GSC} in
the Transmittal of Letters from {Gen. George C.
Marshall} to {Gov. Thomas E. Dewey}, the Latter Part of
{September}, 1944",
journal = j-CRYPTOLOGIA,
volume = "7",
number = "2",
pages = "119--131",
month = apr,
year = "1983",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118391857856",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:38 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902504~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "VII",
xxtitle = "{Gen. Marshall}'s Request of {Gov. Thomas E. Dewey}",
}
@Article{Bratzel:1983:ACL,
author = "John F. Bratzel and Leslie B. Rout",
title = "{Abwehr} Ciphers in {Latin America}",
journal = j-CRYPTOLOGIA,
volume = "7",
number = "2",
pages = "132--144",
month = apr,
year = "1983",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118391857865",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:38 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902505~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "VII",
}
@Article{Kruh:1983:TC,
author = "Louis Kruh and C. A. Deavours",
title = "The {Typex} Cryptograph",
journal = j-CRYPTOLOGIA,
volume = "7",
number = "2",
pages = "145--166",
month = apr,
year = "1983",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118391857874",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:38 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902506~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "VII",
}
@Article{Mellen:1983:CCb,
author = "Greg Mellen",
title = "Cryptanalysis' Corner",
journal = j-CRYPTOLOGIA,
volume = "7",
number = "2",
pages = "167--169",
month = apr,
year = "1983",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118391857883",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:38 MDT 2008",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902507~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "VII",
}
@Article{Ndam:1983:PRD,
author = "Babacar Alassane Ndam and Amadou Sarr",
title = "The Problem of Reciprocity in a {Delastelle} Digraphic
Substitution",
journal = j-CRYPTOLOGIA,
volume = "7",
number = "2",
pages = "170--179",
month = apr,
year = "1983",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118391857892",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:38 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902508~db=all~order=page",
ZMnumber = "518.94013",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "VII",
xxauthor = "Babacar Alassane Ndaw and Amadou Sarr",
}
@Article{Simmons:1983:WPP,
author = "Gustavus J. Simmons",
title = "A ``Weak'' Privacy Protocol Using the {RSA} Crypto
Algorithm",
journal = j-CRYPTOLOGIA,
volume = "7",
number = "2",
pages = "180--182",
month = apr,
year = "1983",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118391857900",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:38 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902509~db=all~order=page",
ZMnumber = "537.94013",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "VII",
}
@Article{Meijer:1983:RDS,
author = "Henk Meijer and Selim Akl",
title = "Remarks on a Digital Signature Scheme",
journal = j-CRYPTOLOGIA,
volume = "7",
number = "2",
pages = "183--186",
month = apr,
year = "1983",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118391857919",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:38 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902510~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "VII",
}
@Article{Deavours:1983:VAP,
author = "C. A. Deavours",
title = "The View From Across the Pond: An Interview With the
{Geneva Management Group}",
journal = j-CRYPTOLOGIA,
volume = "7",
number = "2",
pages = "187--190",
month = apr,
year = "1983",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118391857928",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:38 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902511~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "VII",
}
@Article{Anonymous:1983:BCb,
author = "Anonymous",
title = "Biographies of Contributors",
journal = j-CRYPTOLOGIA,
volume = "7",
number = "2",
pages = "191--192",
month = apr,
year = "1983",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118391857937",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:38 MDT 2008",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902512~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "VII",
}
@Article{Strasser:1983:NCD,
author = "Gerhard F. Strasser",
title = "The Noblest Cryptologist: {Duke August the Younger of
Brunswick--Luneburg (Gustavus Selenus)} and his
Cryptological Activities",
journal = j-CRYPTOLOGIA,
volume = "7",
number = "3",
pages = "193--217",
month = jul,
year = "1983",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118391857946",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
MRclass = "01A45",
MRnumber = "84m:01018",
MRreviewer = "M. Kline",
bibdate = "Mon Jun 30 15:38:39 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902514~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "VII",
}
@Article{Bennett:1983:UPS,
author = "Donald H. Bennett",
title = "An Unsolved Puzzle Solved",
journal = j-CRYPTOLOGIA,
volume = "7",
number = "3",
pages = "218--234",
month = jul,
year = "1983",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118391857955",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:39 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902515~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "VII",
}
@Article{Davies:1983:EMS,
author = "Donald W. Davies",
title = "The Early Models of the {Siemens and Halske T52}
Cipher Machine",
journal = j-CRYPTOLOGIA,
volume = "7",
number = "3",
pages = "235--253",
month = jul,
year = "1983",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118391857964",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:39 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902516~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "VII",
}
@Article{Kahn:1983:ER,
author = "David Kahn",
title = "{Eurocrypt 83}: a Report",
journal = j-CRYPTOLOGIA,
volume = "7",
number = "3",
pages = "254--256",
month = jul,
year = "1983",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118391857973",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:39 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902517~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "VII",
}
@Article{Mueller-Schloer:1983:GCE,
author = "Christian Mueller-Schloer",
title = "{DES}-Generated Checksums for Electronic Signatures",
journal = j-CRYPTOLOGIA,
volume = "7",
number = "3",
pages = "257--273",
month = jul,
year = "1983",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118391857982",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:39 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902518~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "VII",
}
@Article{Mellen:1983:CCc,
author = "Greg Mellen",
title = "Cryptanalysts' Corner",
journal = j-CRYPTOLOGIA,
volume = "7",
number = "3",
pages = "274--277",
month = jul,
year = "1983",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118391857991",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:39 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902519~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "VII",
}
@Article{Kruh:1983:BMA,
author = "Louis Kruh and Greg Mellen",
title = "Book, Movie, Article and Game Reviews",
journal = j-CRYPTOLOGIA,
volume = "7",
number = "3",
pages = "278--286",
month = jul,
year = "1983",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118391858008",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:39 MDT 2008",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902520~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "VII",
}
@Article{Anonymous:1983:BCc,
author = "Anonymous",
title = "Biographies of Contributors",
journal = j-CRYPTOLOGIA,
volume = "7",
number = "3",
pages = "287--288",
month = jul,
year = "1983",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118391858017",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:39 MDT 2008",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902521~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "VII",
}
@Article{Kruh:1983:HUG,
author = "Louis Kruh",
title = "How to Use the {German Enigma} Cipher Machine: a
Photographic Essay",
journal = j-CRYPTOLOGIA,
volume = "7",
number = "4",
pages = "291--296",
month = oct,
year = "1983",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118391858026",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:39 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902523~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "VII",
xxtitle = "{German Enigma} Cipher Machine: a Photographic Essay",
xxtitle = "How to Use the {German Enigma} Cipher Machine. A
Photographic Essay",
}
@Article{Leighton:1983:SKB,
author = "Albert C. Leighton and Stephen M. Matyas",
title = "The Search for the Key Book to {Nicholas Trist}'s Book
Ciphers",
journal = j-CRYPTOLOGIA,
volume = "7",
number = "4",
pages = "297--314",
month = oct,
year = "1983",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118391858035",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:39 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902524~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "VII",
}
@Article{Anonymous:1983:AEI,
author = "Anonymous",
title = "From the archives: Examples of Intelligence Obtained
from Cryptanalysis, {1 August 1946}",
journal = j-CRYPTOLOGIA,
volume = "7",
number = "4",
pages = "315--326",
month = oct,
year = "1983",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118391858044",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:39 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902525~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "VII",
}
@Article{Winkler:1983:ACG,
author = "Peter Winkler",
title = "The Advent of Cryptology in the Game of Bridge",
journal = j-CRYPTOLOGIA,
volume = "7",
number = "4",
pages = "327--332",
month = oct,
year = "1983",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118391858053",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:39 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902526~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "VII",
}
@Article{Stuerzinger:1983:BC,
author = "Oskar Stuerzinger",
title = "The {B-21} Cryptograph",
journal = j-CRYPTOLOGIA,
volume = "7",
number = "4",
pages = "333--346",
month = oct,
year = "1983",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118391858062",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:39 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902527~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "VII",
}
@Article{Brandstrom:1983:PKC,
author = "Hugo Br{\"a}ndstr{\"o}m",
title = "A public-key cryptosystem based upon equations over a
finite field",
journal = j-CRYPTOLOGIA,
volume = "7",
number = "4",
pages = "347--358",
month = oct,
year = "1983",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118391858071",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:39 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902528~db=all~order=page",
ZMnumber = "537.94014",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "VII",
}
@Article{Wolf:1983:RMB,
author = "Daniel Wolf",
title = "{ROTERM}: a Microprocessor Based Cipher Terminal
System",
journal = j-CRYPTOLOGIA,
volume = "7",
number = "4",
pages = "359--370",
month = oct,
year = "1983",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118391858080",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:39 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902529~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "VII",
}
@Article{Mellen:1983:CCd,
author = "Greg Mellen",
title = "Cryptanalysts' Corner",
journal = j-CRYPTOLOGIA,
volume = "7",
number = "4",
pages = "371--374",
month = oct,
year = "1983",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118391858099",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:39 MDT 2008",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902530~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "VII",
}
@Article{Kruh:1983:BR,
author = "Louis Kruh",
title = "Book Reviews",
journal = j-CRYPTOLOGIA,
volume = "7",
number = "4",
pages = "375--379",
month = oct,
year = "1983",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118391858107",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:39 MDT 2008",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902531~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "VII",
}
@Article{Anonymous:1983:BCd,
author = "Anonymous",
title = "Biographies of Contributors",
journal = j-CRYPTOLOGIA,
volume = "7",
number = "4",
pages = "380--381",
month = oct,
year = "1983",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118391858116",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:39 MDT 2008",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902532~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "VII",
}
@Article{Levine:1984:UCP,
author = "J. Levine",
title = "{U.S.} Cryptographic Patents 1861--1981",
journal = j-CRYPTOLOGIA,
volume = "8",
number = "??",
pages = "??--??",
month = "????",
year = "1984",
CODEN = "CRYPE6",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Sat Nov 21 12:35:16 MST 1998",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "VIII",
}
@Article{Simmons:1984:SVU,
author = "Gustavus J. Simmons",
title = "A System for Verifying User Identity and Authorization
at the Point-Of Sale or Access",
journal = j-CRYPTOLOGIA,
volume = "8",
number = "1",
pages = "1--21",
month = jan,
year = "1984",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118491858737",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:40 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902567~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "VIII",
}
@Article{Sorkin:1984:LCA,
author = "Arthur Sorkin",
title = "{LUCIFER}, a Cryptographic Algorithm",
journal = j-CRYPTOLOGIA,
volume = "8",
number = "1",
pages = "22--42",
month = jan,
year = "1984",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118491858746",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:40 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib;
Theory/crypto.security.bib",
note = "See also erratum, Cryptologia {\bf 7}, 1978, p. 118",
URL = "http://www.informaworld.com/smpp/content~content=a741902568~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "VIII",
}
@Article{Kruh:1984:RTC,
author = "Louis Kruh and Greg Mellen",
title = "Reviews of Things Cryptologic",
journal = j-CRYPTOLOGIA,
volume = "8",
number = "1",
pages = "43--53",
month = jan,
year = "1984",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118491858755",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:40 MDT 2008",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902569~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "VIII",
}
@Article{Kruh:1984:WDI,
author = "Louis Kruh",
title = "Who Did It?",
journal = j-CRYPTOLOGIA,
volume = "8",
number = "1",
pages = "54--54",
month = jan,
year = "1984",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118491858764",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:40 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902570~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "VIII",
}
@Article{Mellen:1984:CCa,
author = "Greg Mellen",
title = "Cryptanalysts' Corner",
journal = j-CRYPTOLOGIA,
volume = "8",
number = "1",
pages = "55--57",
month = jan,
year = "1984",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118491858773",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:40 MDT 2008",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902571~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "VIII",
}
@Article{Kahn:1984:CMI,
author = "David Kahn",
title = "Cipher Machine Inventor --- {Boris Hagelin} Dies",
journal = j-CRYPTOLOGIA,
volume = "8",
number = "1",
pages = "60--61",
month = jan,
year = "1984",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118491858782",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:40 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902572~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "VIII",
xxtitle = "Cipher Machine Inventor --- {Boris Hagelin}",
}
@Article{Yardley:1984:AAC,
author = "Herbert O. Yardley",
title = "From the archives: Achievements of {Cipher Bureau
MI-8} During the {First World War}. Documents by {Major
Herbert O. Yardley} Prepared Under the Direction of the
{Chief Signal Officer, 25 May 1945, SPSIS-1. Signal
Security Agency. Washington, DC}",
journal = j-CRYPTOLOGIA,
volume = "8",
number = "1",
pages = "62--74",
month = jan,
year = "1984",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118491858791",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:40 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902573~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "VIII",
}
@Article{Kruh:1984:BFI,
author = "Louis Kruh",
title = "Because of the {Freedom of Information Act (FOIA)}",
journal = j-CRYPTOLOGIA,
volume = "8",
number = "1",
pages = "75--77",
month = jan,
year = "1984",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118491858809",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:40 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902574~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "VIII",
}
@Article{Kruh:1984:CD,
author = "Louis Kruh",
title = "Cipher Devices",
journal = j-CRYPTOLOGIA,
volume = "8",
number = "1",
pages = "78--79",
month = jan,
year = "1984",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118491858818",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:40 MDT 2008",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902575~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "VIII",
}
@Article{Gillogly:1984:MA,
author = "James J. Gillogly",
title = "The Mysterious Autocryptograph",
journal = j-CRYPTOLOGIA,
volume = "8",
number = "1",
pages = "79--81",
month = jan,
year = "1984",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118491858827",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:40 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902576~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "VIII",
}
@Article{Davies:1984:A,
author = "Donald W. Davies",
title = "The {Autocryptograph}",
journal = j-CRYPTOLOGIA,
volume = "8",
number = "1",
pages = "82--92",
month = jan,
year = "1984",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118491858836",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:40 MDT 2008",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902577~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "VIII",
}
@Article{Anonymous:1984:BCa,
author = "Anonymous",
title = "Biographies of Contributors",
journal = j-CRYPTOLOGIA,
volume = "8",
number = "1",
pages = "93--94",
month = jan,
year = "1984",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118491858845",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:40 MDT 2008",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902578~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "VIII",
}
@Article{Retter:1984:CMM,
author = "Charles T. Retter",
title = "Cryptanalysis of a {Maclaren--Marsaglia} System",
journal = j-CRYPTOLOGIA,
volume = "8",
number = "2",
pages = "97--108",
month = apr,
year = "1984",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118491858854",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:41 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
note = "See also letters and responses, Cryptologia {\bf 8},
1984, pp. 374--378.",
URL = "http://www.informaworld.com/smpp/content~content=a741902581~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "VIII",
}
@Article{Anonymous:1984:PSO,
author = "Anonymous",
title = "Project on Secrecy and Openness in Scientific and
Technical Communication",
journal = j-CRYPTOLOGIA,
volume = "8",
number = "2",
pages = "109--111",
month = apr,
year = "1984",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118491858863",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:41 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902582~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "VIII",
}
@Article{Kruh:1984:HHC,
author = "Louis Kruh",
title = "Hand-Held Crypto Device {SEC-36}",
journal = j-CRYPTOLOGIA,
volume = "8",
number = "2",
pages = "112--114",
month = apr,
year = "1984",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118491858872",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:41 MDT 2008",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902583~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "VIII",
}
@Article{Davies:1984:SHC,
author = "Donald W. Davies",
title = "{Sidney Hole}'s Cryptographic Machine",
journal = j-CRYPTOLOGIA,
volume = "8",
number = "2",
pages = "115--126",
month = apr,
year = "1984",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118491858881",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:41 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902584~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "VIII",
}
@Article{Kruh:1984:LR,
author = "Louis Kruh",
title = "Literature Reviews",
journal = j-CRYPTOLOGIA,
volume = "8",
number = "2",
pages = "127--131",
month = apr,
year = "1984",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118491858890",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:41 MDT 2008",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902585~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "VIII",
}
@Article{Tilt:1984:KTM,
author = "Borge Tilt",
title = "On {Kullback}'s $ \chi $-tests for matching and
non-matching multinomial distributions",
journal = j-CRYPTOLOGIA,
volume = "8",
number = "2",
pages = "132--141",
month = apr,
year = "1984",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118491858908",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
MRclass = "62F03",
MRnumber = "85k:62048",
bibdate = "Mon Jun 30 15:38:41 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902586~db=all~order=page;
http://www.informaworld.com/smpp/content~content=a757776821~db=all~order=page",
ZMnumber = "545.62021",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "VIII",
}
@Article{Carroll:1984:SPM,
author = "John M. Carroll and Pierre G. Laurin",
title = "Software Protection for Microcomputers",
journal = j-CRYPTOLOGIA,
volume = "8",
number = "2",
pages = "142--160",
month = apr,
year = "1984",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118491858917",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:41 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902587~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "VIII",
xxtitle = "Software Protection for Micros",
}
@Article{Levine:1984:CPC,
author = "Jack Levine",
title = "Corrections for Published Copy of {United States}
Cryptographic Patents: 1861--1981",
journal = j-CRYPTOLOGIA,
volume = "8",
number = "2",
pages = "161--162",
month = apr,
year = "1984",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118491858926",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:41 MDT 2008",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902588~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "VIII",
}
@Article{Kruh:1984:SRC,
author = "Louis Kruh",
title = "The {Slidex RT} Code",
journal = j-CRYPTOLOGIA,
volume = "8",
number = "2",
pages = "163--172",
month = apr,
year = "1984",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118491858935",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:41 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902589~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "VIII",
}
@Article{Erskine:1984:BIV,
author = "Ralph Erskine",
title = "{``British Intelligence --- Volume II''} --- Book
Review",
journal = j-CRYPTOLOGIA,
volume = "8",
number = "2",
pages = "173--180",
month = apr,
year = "1984",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118491858944",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:41 MDT 2008",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902590~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "VIII",
}
@Article{Anonymous:1984:ACC,
author = "Anonymous",
title = "From the Archives: Codes and Ciphers for Combined
Air-Amphibian Operations",
journal = j-CRYPTOLOGIA,
volume = "8",
number = "2",
pages = "181--186",
month = apr,
year = "1984",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118491858953",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:41 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902591~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
remark = "Coordinating cipher material for the Allied invasion
of France.",
romanvolume = "VIII",
}
@Article{Shulman:1984:UCD,
author = "David Shulman",
title = "An Unknown Cipher Disk",
journal = j-CRYPTOLOGIA,
volume = "8",
number = "2",
pages = "187--190",
month = apr,
year = "1984",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118491858962",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:41 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902592~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "VIII",
}
@Article{Anonymous:1984:BS,
author = "Anonymous",
title = "Biographical Sketches",
journal = j-CRYPTOLOGIA,
volume = "8",
number = "2",
pages = "191--192",
month = apr,
year = "1984",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118491858971",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:41 MDT 2008",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902593~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "VIII",
}
@Article{Hammant:1984:ORN,
author = "Thomas R. Hammant",
title = "The Origins of {Russian Navy} Communications
Intelligence",
journal = j-CRYPTOLOGIA,
volume = "8",
number = "3",
pages = "193--202",
month = jul,
year = "1984",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118491858980",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:41 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902595~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "VIII",
xxtitle = "Origins of {Russian Navy Intelligence}",
}
@Article{Guelker:1984:CWM,
author = "Francis Guelker",
title = "A Cryptographer's War Memories",
journal = j-CRYPTOLOGIA,
volume = "8",
number = "3",
pages = "203--207",
month = jul,
year = "1984",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118491858999",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:41 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902596~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "VIII",
}
@Article{Weller:1984:RAJ,
author = "Robert Weller",
title = "{Rear Admiral Joseph N. Wenger USN (Ret)} and the
{Naval Cryptologic Museum}",
journal = j-CRYPTOLOGIA,
volume = "8",
number = "3",
pages = "208--234",
month = jul,
year = "1984",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118491859006",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:41 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902597~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "VIII",
}
@Article{Arnold:1984:VRC,
author = "Philip M. Arnold",
title = "{``A View of Renaissance Cryptography''} --- a Book
Review",
journal = j-CRYPTOLOGIA,
volume = "8",
number = "3",
pages = "235--241",
month = jul,
year = "1984",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118491859015",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:41 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902598~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "VIII",
}
@Article{Deavours:1984:RSA,
author = "C. A. Deavours",
title = "Reflections on the ``State of the Art''",
journal = j-CRYPTOLOGIA,
volume = "8",
number = "3",
pages = "242--245",
month = jul,
year = "1984",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118491859024",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:41 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902599~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "VIII",
}
@Article{Kruh:1984:CLa,
author = "Louis Kruh",
title = "Cryptology and the Law",
journal = j-CRYPTOLOGIA,
volume = "8",
number = "3",
pages = "246--248",
month = jul,
year = "1984",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118491859033",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:41 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902600~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "VIII",
}
@Article{Kruh:1984:CE,
author = "Louis Kruh",
title = "Cipher Equipment",
journal = j-CRYPTOLOGIA,
volume = "8",
number = "3",
pages = "249--249",
month = jul,
year = "1984",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118491859042",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:41 MDT 2008",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902601~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "VIII",
}
@Article{Davies:1984:SPS,
author = "Donald W. Davies",
title = "{Sir Percy Scott}'s Cypher",
journal = j-CRYPTOLOGIA,
volume = "8",
number = "3",
pages = "250--252",
month = jul,
year = "1984",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118491859051",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:41 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902602~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "VIII",
xxtitle = "{Sir Percy Scott}'s Cipher",
}
@Article{Delaurentis:1984:FWC,
author = "John M. Delaurentis",
title = "A further weakness in the {Common Modulus Protocol}
for the {RSA} cryptoalgorithm",
journal = j-CRYPTOLOGIA,
volume = "8",
number = "3",
pages = "253--259",
month = jul,
year = "1984",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118491859060",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
MRclass = "94A60 (11T71 68P25)",
MRnumber = "85m:94025",
MRreviewer = "James G. Dunham",
bibdate = "Mon Jun 30 15:38:41 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902603~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "VIII",
}
@Article{Carroll:1984:RMK,
author = "John M. Carroll",
title = "The Resurrection of Multiple-Key Ciphers",
journal = j-CRYPTOLOGIA,
volume = "8",
number = "3",
pages = "262--265",
month = jul,
year = "1984",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118491859079",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:41 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902604~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "VIII",
}
@Article{Blakley:1984:ACS,
author = "G. R. Blakley",
title = "{AAAS} Crypto Sessions Proceedings: Review",
journal = j-CRYPTOLOGIA,
volume = "8",
number = "3",
pages = "266--269",
month = jul,
year = "1984",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118491859088",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:41 MDT 2008",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902605~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "VIII",
}
@Article{Mellen:1984:CCb,
author = "Greg Mellen",
title = "Cryptanalysts' Corner",
journal = j-CRYPTOLOGIA,
volume = "8",
number = "3",
pages = "270--275",
month = jul,
year = "1984",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118491859097",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:41 MDT 2008",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902606~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "VIII",
}
@Article{Kruh:1984:CET,
author = "Louis Kruh",
title = "Cipher Equipment: {Tst 3336} and {Tst 9761}",
journal = j-CRYPTOLOGIA,
volume = "8",
number = "3",
pages = "278--284",
month = jul,
year = "1984",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118491859105",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:41 MDT 2008",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902607~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "VIII",
}
@Article{Jueneman:1984:IAB,
author = "Robert R. Jueneman",
title = "{IACR} Announces Bulletin Board Service",
journal = j-CRYPTOLOGIA,
volume = "8",
number = "3",
pages = "285--286",
month = jul,
year = "1984",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118491859114",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:41 MDT 2008",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902608~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "VIII",
}
@Article{Anonymous:1984:BCb,
author = "Anonymous",
title = "Biographies of Contributors",
journal = j-CRYPTOLOGIA,
volume = "8",
number = "3",
pages = "287--288",
month = jul,
year = "1984",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118491859123",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:41 MDT 2008",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902609~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "VIII",
}
@Article{Kruh:1984:HC,
author = "Louis Kruh",
title = "The Heraldry of Cryptology",
journal = j-CRYPTOLOGIA,
volume = "8",
number = "4",
pages = "289--301",
month = oct,
year = "1984",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118491859132",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:42 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902611~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "VIII",
}
@Article{Landsverk:1984:CRI,
author = "O. G. Landsverk",
title = "Cryptography in Runic Inscriptions",
journal = j-CRYPTOLOGIA,
volume = "8",
number = "4",
pages = "302--319",
month = oct,
year = "1984",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118491859141",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
MRclass = "01A35 (94A60)",
MRnumber = "86e:01014",
MRreviewer = "J. S. Joel",
bibdate = "Mon Jun 30 15:38:42 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
note = "See remark \cite{Johnsen:2001:CRI}.",
URL = "http://www.informaworld.com/smpp/content~content=a741902612~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "VIII",
}
@Article{Mellen:1984:CCc,
author = "Greg Mellen",
title = "Cryptanalysts' Corner",
journal = j-CRYPTOLOGIA,
volume = "8",
number = "4",
pages = "320--325",
month = oct,
year = "1984",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118491859150",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:42 MDT 2008",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902613~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "VIII",
}
@Article{Kruh:1984:CLb,
author = "Louis Kruh",
title = "Cryptology and the Law",
journal = j-CRYPTOLOGIA,
volume = "8",
number = "4",
pages = "326--331",
month = oct,
year = "1984",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118491859169",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:42 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902614~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "VIII",
}
@Article{Erskine:1984:ATE,
author = "Ralph Erskine",
title = "{{\booktitle{Alan Turing: The Enigma}}} --- Book
Review",
journal = j-CRYPTOLOGIA,
volume = "8",
number = "4",
pages = "332--336",
month = oct,
year = "1984",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118491859178",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:42 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/bibnet/authors/t/turing-alan-mathison.bib;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902615~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "VIII",
}
@Article{Kullback:1984:LB,
author = "Solomon Kullback",
title = "Looking Back",
journal = j-CRYPTOLOGIA,
volume = "8",
number = "4",
pages = "337--342",
month = oct,
year = "1984",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118491859187",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:42 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902616~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "VIII",
}
@Article{Cooper:1984:GKA,
author = "Rodney Cooper and Wayne Patterson",
title = "A generalization of the knapsack algorithm using
{Galois} fields",
journal = j-CRYPTOLOGIA,
volume = "8",
number = "4",
pages = "343--347",
month = oct,
year = "1984",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118491859196",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
MRclass = "94A60 (11Y05)",
MRnumber = "86i:94038",
bibdate = "Mon Jun 30 15:38:42 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902617~db=all~order=page",
ZMnumber = "553.94007",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "VIII",
}
@Article{Anderson:1984:FVS,
author = "Roland Anderson",
title = "Finding Vowels in Simple Substitution Ciphers by
Computer",
journal = j-CRYPTOLOGIA,
volume = "8",
number = "4",
pages = "348--359",
month = oct,
year = "1984",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118491859204",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:42 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902618~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "VIII",
}
@Article{Deavours:1984:CSS,
author = "C. A. Deavours and Brian J. Winkel",
title = "{``Cryptanalysis of Shift Stream Generated Stream
Cipher Systems''}: Book Review",
journal = j-CRYPTOLOGIA,
volume = "8",
number = "4",
pages = "360--363",
month = oct,
year = "1984",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118491859213",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:42 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
note = "See \cite{Barker:1984:CSR}.",
URL = "http://www.informaworld.com/smpp/content~content=a741902619~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "VIII",
}
@Article{Kruh:1984:TTR,
author = "Louis Kruh",
title = "There and There --- Reviews and News",
journal = j-CRYPTOLOGIA,
volume = "8",
number = "4",
pages = "364--373",
month = oct,
year = "1984",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118491859222",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:42 MDT 2008",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902620~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "VIII",
}
@Article{Anonymous:1984:BCc,
author = "Anonymous",
title = "Biographies of Contributors",
journal = j-CRYPTOLOGIA,
volume = "8",
number = "4",
pages = "379--380",
month = oct,
year = "1984",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118491859231",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:42 MDT 2008",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902621~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "VIII",
}
@Article{Unknown:1984:ATE,
author = "Unknown",
title = "{Alan Turing}: The {Enigma}",
journal = j-CRYPTOLOGIA,
volume = "8",
number = "4",
pages = "??--??",
month = oct,
year = "1984",
CODEN = "CRYPE6",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Sat Nov 21 12:35:16 MST 1998",
bibsource = "ftp://ftp.math.utah.edu/pub/bibnet/authors/a/turing-alan-mathison.bib;
http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "VIII",
}
@Article{Kahn:1985:AAB,
author = "David Kahn",
title = "The Annotated {The American Black Chamber}",
journal = j-CRYPTOLOGIA,
volume = "9",
number = "1",
pages = "1--37",
month = jan,
year = "1985",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118591859735",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:43 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902691~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "IX",
}
@Article{Kruh:1985:AVS,
author = "Louis Kruh",
title = "An Armchair View of the {Smithsonian Institution}
Cipher Machine Exhibit",
journal = j-CRYPTOLOGIA,
volume = "9",
number = "1",
pages = "38--51",
month = jan,
year = "1985",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118591859744",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:43 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902692~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "IX",
}
@Article{Erskine:1985:ESS,
author = "Ralph Erskine",
title = "An Early Success Story",
journal = j-CRYPTOLOGIA,
volume = "9",
number = "1",
pages = "52--54",
month = jan,
year = "1985",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118591859753",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:43 MDT 2008",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902693~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "IX",
}
@Article{Gillogly:1985:FPM,
author = "James J. Gillogly",
title = "Fast Pattern Matching for Word Lists",
journal = j-CRYPTOLOGIA,
volume = "9",
number = "1",
pages = "55--62",
month = jan,
year = "1985",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118591859762",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:43 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902694~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "IX",
}
@Article{Franksen:1985:EW,
author = "Ole Immanuel Franksen",
title = "Expert Witness",
journal = j-CRYPTOLOGIA,
volume = "9",
number = "1",
pages = "63--69",
month = jan,
year = "1985",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118591859771",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:43 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902695~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "IX",
}
@Article{Mellen:1985:CCa,
author = "Greg Mellen",
title = "Cryptanalysts' Corner",
journal = j-CRYPTOLOGIA,
volume = "9",
number = "1",
pages = "70--74",
month = jan,
year = "1985",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118591859780",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:43 MDT 2008",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902696~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "IX",
}
@Article{Scott:1985:WOE,
author = "Robert Scott",
title = "Wide-Open Encryption Design Offers Flexible
Implementations",
journal = j-CRYPTOLOGIA,
volume = "9",
number = "1",
pages = "75--91",
month = jan,
year = "1985",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118591859799",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:43 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902697~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "IX",
}
@Article{Murray:1985:CB,
author = "Master Sgt. Charles Murray",
title = "The Crypt Bug",
journal = j-CRYPTOLOGIA,
volume = "9",
number = "1",
pages = "92--92",
month = jan,
year = "1985",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118591859807",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:43 MDT 2008",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902698~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "IX",
}
@Article{Anonymous:1985:BCa,
author = "Anonymous",
title = "Biographies of Contributors",
journal = j-CRYPTOLOGIA,
volume = "9",
number = "1",
pages = "95--96",
month = jan,
year = "1985",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118591859816",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:43 MDT 2008",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902699~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "IX",
}
@Article{Michener:1985:GRC,
author = "John R. Michener",
title = "The ``Generalized Rotor'' Cryptographic Operator and
Some of Its Applications",
journal = j-CRYPTOLOGIA,
volume = "9",
number = "2",
pages = "97--113",
month = apr,
year = "1985",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118591859825",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:43 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902702~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "IX",
}
@Article{Retter:1985:KSA,
author = "Charles T. Retter",
title = "A Key-Search Attack on {Maclaren--Marsaglia} Systems",
journal = j-CRYPTOLOGIA,
volume = "9",
number = "2",
pages = "114--130",
month = apr,
year = "1985",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118591859834",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:43 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902703~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "IX",
}
@Article{Mitchell:1985:PSC,
author = "Douglas W. Mitchell",
title = "A Polygraphic Substitution Cipher Based on Multiple
Interlocking Applications of {Playfair}",
journal = j-CRYPTOLOGIA,
volume = "9",
number = "2",
pages = "131--139",
month = apr,
year = "1985",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118591859843",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:43 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902704~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "IX",
}
@Article{Varadharajan:1985:ERC,
author = "V. Varadharajan and R. Odoni",
title = "Extension of {RSA} cryptosystems to matrix rings",
journal = j-CRYPTOLOGIA,
volume = "9",
number = "2",
pages = "140--153",
month = apr,
year = "1985",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118591859852",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
MRclass = "94A60 (11T71)",
MRnumber = "86g:94039",
MRreviewer = "N. J. A. Sloane",
bibdate = "Mon Jun 30 15:38:43 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902705~db=all~order=page",
ZMnumber = "652.94013",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "IX",
}
@Article{Kruh:1985:CE,
author = "Louis Kruh",
title = "Cipher Equipment",
journal = j-CRYPTOLOGIA,
volume = "9",
number = "2",
pages = "154--154",
month = apr,
year = "1985",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118591859861",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:43 MDT 2008",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902706~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "IX",
}
@Article{Davies:1985:CWC,
author = "Donald W. Davies",
title = "{Charles Wheatstone}'s Cryptograph and {Pletts}'
Cipher Machine",
journal = j-CRYPTOLOGIA,
volume = "9",
number = "2",
pages = "155--160",
month = apr,
year = "1985",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118591859870",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:43 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902707~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "IX",
}
@Article{Mellen:1985:CCb,
author = "Greg Mellen",
title = "Cryptanalysts' Corner",
journal = j-CRYPTOLOGIA,
volume = "9",
number = "2",
pages = "161--166",
month = apr,
year = "1985",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118591859889",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:43 MDT 2008",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902708~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "IX",
}
@Article{Price:1985:CCS,
author = "Robert Price",
title = "A conversation with {Claude Shannon}: one man's
approach to problem solving",
journal = j-CRYPTOLOGIA,
volume = "9",
number = "2",
pages = "167--175",
month = apr,
year = "1985",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118591859898",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
MRclass = "01A99",
MRnumber = "86k:01053",
bibdate = "Mon Jun 30 15:38:43 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902709~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "IX",
}
@Article{Kruh:1985:RL,
author = "Louis Kruh",
title = "Reviews of the Literature",
journal = j-CRYPTOLOGIA,
volume = "9",
number = "2",
pages = "176--186",
month = apr,
year = "1985",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118591859906",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:43 MDT 2008",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902710~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "IX",
}
@Article{Anonymous:1985:BCb,
author = "Anonymous",
title = "Biographies of Contributors",
journal = j-CRYPTOLOGIA,
volume = "9",
number = "2",
pages = "188--189",
month = apr,
year = "1985",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118591859915",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:43 MDT 2008",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902711~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "IX",
}
@Article{Michener:1985:AGR,
author = "John R. Michener",
title = "Application of the Generalized Rotor Cryptographic
Operator in the Construction of
Substitution-Permutation Network Block Codes",
journal = j-CRYPTOLOGIA,
volume = "9",
number = "3",
pages = "193--201",
month = jun,
year = "1985",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118591859924",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:44 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902713~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "IX",
}
@Article{Kruskal:1985:TCS,
author = "Joseph R. Kruskal",
title = "A Trigraph Cipher With a Short Key for Hand Use",
journal = j-CRYPTOLOGIA,
volume = "9",
number = "3",
pages = "202--222",
month = jun,
year = "1985",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118591859933",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
MRclass = "94A60",
MRnumber = "806 443",
bibdate = "Mon Jun 30 15:38:44 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902714~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "IX",
}
@Article{Williams:1985:SPK,
author = "H. C. Williams",
title = "Some Public-Key Crypto-Functions as Intractable as
Factorization",
journal = j-CRYPTOLOGIA,
volume = "9",
number = "3",
pages = "223--237",
month = jun,
year = "1985",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118591859942",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
MRclass = "94A60 (11T71)",
MRnumber = "86m:94033",
bibdate = "Mon Jun 30 15:38:44 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902715~db=all~order=page",
ZMnumber = "652.94012",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "IX",
}
@Article{Outerbridge:1985:DLA,
author = "Richard Outerbridge",
title = "{DEA} and {Lucifer} Available on {Compuserve}",
journal = j-CRYPTOLOGIA,
volume = "9",
number = "3",
pages = "238--239",
month = jun,
year = "1985",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118591859951",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:44 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902716~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "IX",
}
@Article{Kranz:1985:EHR,
author = "Fred W. Kranz",
title = "Early History of {Riverbank Acoustical Laboratories}",
journal = j-CRYPTOLOGIA,
volume = "9",
number = "3",
pages = "240--246",
month = jun,
year = "1985",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118591859960",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:44 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902717~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "IX",
}
@Article{Winkel:1985:TTC,
author = "Brian J. Winkel",
title = "There and There --- a Column of News",
journal = j-CRYPTOLOGIA,
volume = "9",
number = "3",
pages = "247--251",
month = jun,
year = "1985",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118591859979",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:44 MDT 2008",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902718~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "IX",
}
@Article{Kruh:1985:KLC,
author = "Louis Kruh",
title = "The {Kryha Liliput} Ciphering Machine",
journal = j-CRYPTOLOGIA,
volume = "9",
number = "3",
pages = "252--261",
month = jun,
year = "1985",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118591859988",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:44 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902719~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "IX",
}
@Article{Erskine:1985:BIV,
author = "Ralph Erskine",
title = "{British Intelligence --- Volume 3, Part 1} --- Book
Review",
journal = j-CRYPTOLOGIA,
volume = "9",
number = "3",
pages = "262--272",
month = jun,
year = "1985",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118591859997",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:44 MDT 2008",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902720~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "IX",
}
@Article{Kruh:1985:CLIa,
author = "Louis Kruh",
title = "Cryptology and the Law --- {III}",
journal = j-CRYPTOLOGIA,
volume = "9",
number = "3",
pages = "273--285",
month = jun,
year = "1985",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118591860003",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:44 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902721~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "IX",
}
@Article{Anonymous:1985:BCc,
author = "Anonymous",
title = "Biographies of Contributors",
journal = j-CRYPTOLOGIA,
volume = "9",
number = "3",
pages = "287--288",
month = jun,
year = "1985",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118591860012",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:44 MDT 2008",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902722~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "IX",
}
@Article{Mellen:1985:CCc,
author = "Greg Mellen",
title = "Cryptanalysts' Corner",
journal = j-CRYPTOLOGIA,
volume = "9",
number = "4",
pages = "289--293",
month = oct,
year = "1985",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118591860021",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:45 MDT 2008",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902724~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "IX",
}
@Article{Kruh:1985:RTC,
author = "Louis Kruh and Ralph Erskine",
title = "Review of Things Cryptologic",
journal = j-CRYPTOLOGIA,
volume = "9",
number = "4",
pages = "294--305",
month = oct,
year = "1985",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118591860030",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:45 MDT 2008",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902725~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "IX",
}
@Article{Anonymous:1985:FOS,
author = "Anonymous",
title = "Forty One and Strong: {Arlington Hall Station}",
journal = j-CRYPTOLOGIA,
volume = "9",
number = "4",
pages = "306--310",
month = oct,
year = "1985",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118591860049",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:45 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902726~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "IX",
}
@Article{Kruh:1985:ACS,
author = "Louis Kruh",
title = "Automatic Communications With the {SIGABA} and the
{M-294}",
journal = j-CRYPTOLOGIA,
volume = "9",
number = "4",
pages = "311--315",
month = oct,
year = "1985",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118591860058",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:45 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902727~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "IX",
}
@Article{Erskine:1985:EPC,
author = "Ralph Erskine",
title = "{``Enigma and the Polish Contribution''}: Book
Review",
journal = j-CRYPTOLOGIA,
volume = "9",
number = "4",
pages = "316--323",
month = oct,
year = "1985",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118591860067",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:45 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902728~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "IX",
}
@Article{Kruh:1985:ECS,
author = "Louis Kruh",
title = "Early communications security in the {U.S. Navy}",
journal = j-CRYPTOLOGIA,
volume = "9",
number = "4",
pages = "324--331",
month = oct,
year = "1985",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118591860076",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
MRclass = "94-03 (01A60 94A60)",
MRnumber = "87a:94001",
bibdate = "Mon Jun 30 15:38:45 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902729~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "IX",
}
@Article{Atha:1985:BCH,
author = "Robert I. Atha",
title = "Bombe! ``{I} Could Hardly Believe It!''",
journal = j-CRYPTOLOGIA,
volume = "9",
number = "4",
pages = "332--336",
month = oct,
year = "1985",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118591860085",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:45 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902730~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "IX",
}
@Article{Ephron:1985:ACA,
author = "Henry D. Ephron",
title = "An {American} Cryptanalyst in {Australia}",
journal = j-CRYPTOLOGIA,
volume = "9",
number = "4",
pages = "337--340",
month = oct,
year = "1985",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118591860094",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:45 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902731~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "IX",
}
@Article{Kruh:1985:CLIb,
author = "Louis Kruh",
title = "Cryptology and the Law --- {IV}",
journal = j-CRYPTOLOGIA,
volume = "9",
number = "4",
pages = "348--350",
month = oct,
year = "1985",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118591860102",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:45 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902732~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "IX",
}
@Article{August:1985:ITA,
author = "David August",
title = "Information Theoretic Approach to Secure {LSFR}
Ciphers",
journal = j-CRYPTOLOGIA,
volume = "9",
number = "4",
pages = "351--359",
month = oct,
year = "1985",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118591860111",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:45 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902733~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "IX",
}
@Article{Yagisawa:1985:NMR,
author = "Masahiro Yagisawa",
title = "A New Method for Realizing Public-Key Cryptosystem",
journal = j-CRYPTOLOGIA,
volume = "9",
number = "4",
pages = "360--371, 380",
month = oct,
year = "1985",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118591860120",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
MRclass = "380. 94A60 (11T71)",
MRnumber = "86j:94053",
bibdate = "Mon Jun 30 15:38:45 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902734~db=all~order=page",
ZMnumber = "651.94004",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "IX",
xxpages = "360--372",
}
@Article{Atkinson:1985:COL,
author = "Russell Atkinson",
title = "Ciphers in Oriental Languages",
journal = j-CRYPTOLOGIA,
volume = "9",
number = "4",
pages = "373--380",
month = oct,
year = "1985",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118591860139",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:45 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902735~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "IX",
}
@Article{Anonymous:1985:BCd,
author = "Anonymous",
title = "Biographies of Contributors",
journal = j-CRYPTOLOGIA,
volume = "9",
number = "4",
pages = "381--382",
month = oct,
year = "1985",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118591860148",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:45 MDT 2008",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902736~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "IX",
}
@Article{Winkel:1986:LOE,
author = "Brian J. Winkel",
title = "Letter From One of the {Editors}",
journal = j-CRYPTOLOGIA,
volume = "10",
number = "1",
pages = "1--1",
month = jan,
year = "1986",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118691860732",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:45 MDT 2008",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902910~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "X",
}
@Article{Kruh:1986:CPC,
author = "Louis Kruh",
title = "The Control of Public Cryptography and Freedom of
Speech --- a Review",
journal = j-CRYPTOLOGIA,
volume = "10",
number = "1",
pages = "2--9",
month = jan,
year = "1986",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118691860741",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:45 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902911~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "X",
}
@Article{Anonymous:1986:BCa,
author = "Anonymous",
title = "Biographies of Contributors",
journal = j-CRYPTOLOGIA,
volume = "10",
number = "1",
pages = "9--9",
month = jan,
year = "1986",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118691860750",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:45 MDT 2008",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902912~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "X",
}
@Article{Anderson:1986:IMR,
author = "Roland Anderson",
title = "Improving the Machine Recognition of Vowels in Simple
Substitution Ciphers",
journal = j-CRYPTOLOGIA,
volume = "10",
number = "1",
pages = "10--22",
month = jan,
year = "1986",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118691860769",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:45 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902913~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "X",
}
@Article{Barlow:1986:MSA,
author = "Mike Barlow",
title = "A Machine Solution of the {AMSCO} Cipher",
journal = j-CRYPTOLOGIA,
volume = "10",
number = "1",
pages = "23--33",
month = jan,
year = "1986",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118691860778",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:45 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902914~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "X",
}
@Article{Weierud:1986:MSB,
author = "Frode Weierud",
title = "Machine Secrets: a Book Review",
journal = j-CRYPTOLOGIA,
volume = "10",
number = "1",
pages = "34--37",
month = jan,
year = "1986",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118691860787",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:45 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902915~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "X",
}
@Article{Kahn:1986:SC,
author = "David Kahn",
title = "Secrets of the Codebreakers",
journal = j-CRYPTOLOGIA,
volume = "10",
number = "1",
pages = "38--41",
month = jan,
year = "1986",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118691860796",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:45 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902916~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "X",
}
@Article{Kruh:1986:ART,
author = "Louis Kruh",
title = "Announcements and Reviews of Things Cryptologic",
journal = j-CRYPTOLOGIA,
volume = "10",
number = "1",
pages = "42--45",
month = jan,
year = "1986",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118691860804",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:45 MDT 2008",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902917~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "X",
}
@Article{Deavours:1986:EIC,
author = "C. A. Deavours",
title = "Elle a de l'intelligence et de la conversation",
journal = j-CRYPTOLOGIA,
volume = "10",
number = "1",
pages = "47--49",
month = jan,
year = "1986",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118691860813",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:45 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902918~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "X",
}
@Article{Erskine:1986:AGC,
author = "Ralph Erskine",
title = "From the Archives: {GC} and {CS} Mobilizes {'Men of
the Professor Type'}",
journal = j-CRYPTOLOGIA,
volume = "10",
number = "1",
pages = "50--59",
month = jan,
year = "1986",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118691860822",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:45 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a782216711~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "X",
}
@Article{Kruh:1986:CSEa,
author = "Louis Kruh",
title = "{18th Century} Shorthand Expert Needed",
journal = j-CRYPTOLOGIA,
volume = "10",
number = "1",
pages = "60--62",
month = jan,
year = "1986",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118691860831",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:45 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902920~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "X",
}
@Article{Kruh:1986:CE,
author = "Louis Kruh",
title = "Cipher Equipment",
journal = j-CRYPTOLOGIA,
volume = "10",
number = "1",
pages = "63--63",
month = jan,
year = "1986",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118691860840",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:45 MDT 2008",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902921~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "X",
}
@Article{Davies:1986:CEB,
author = "Donald W. Davies",
title = "Cipher Equipment: {Bolton}'s Cypher Wheel",
journal = j-CRYPTOLOGIA,
volume = "10",
number = "1",
pages = "64--64",
month = jan,
year = "1986",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118691860859",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:45 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902922~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "X",
}
@Article{Kruh:1986:TM,
author = "Louis Kruh",
title = "The {Truman Memorandum}",
journal = j-CRYPTOLOGIA,
volume = "10",
number = "2",
pages = "65--74",
month = apr,
year = "1986",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118691860868",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:46 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902925~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "X",
}
@Article{Desnoyers:1986:CEPa,
author = "Charles-Hubert Desnoyers",
title = "Cryptanalytic Essay --- {Part I}: Solution of Problem
No. 166 Published in Elementary Cryptanalysis",
journal = j-CRYPTOLOGIA,
volume = "10",
number = "2",
pages = "75--95",
month = apr,
year = "1986",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118691860877",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:46 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902926~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "X",
}
@Article{Roggeman:1986:RAC,
author = "Yves Roggeman",
title = "Remarks on the auto-correlation function of binary
periodic sequences",
journal = j-CRYPTOLOGIA,
volume = "10",
number = "2",
pages = "96--100",
month = apr,
year = "1986",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118691860886",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
MRclass = "94A60",
MRnumber = "87e:94031",
bibdate = "Mon Jun 30 15:38:46 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902927~db=all~order=page",
ZMnumber = "652.94011",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "X",
}
@Article{Kruh:1986:CLVa,
author = "Louis Kruh",
title = "Cryptology and the Law --- {V}",
journal = j-CRYPTOLOGIA,
volume = "10",
number = "2",
pages = "101--107",
month = apr,
year = "1986",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118691860895",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:46 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902928~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "X",
}
@Article{Kruh:1986:RTCa,
author = "Louis Kruh",
title = "Reviews of Things Cryptologic",
journal = j-CRYPTOLOGIA,
volume = "10",
number = "2",
pages = "110--122",
month = apr,
year = "1986",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118691860903",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:46 MDT 2008",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902929~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "X",
}
@Article{Minow:1986:NT,
author = "Martin Minow",
title = "No Title",
journal = j-CRYPTOLOGIA,
volume = "10",
number = "2",
pages = "123--125",
month = apr,
year = "1986",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118691860912",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:46 MDT 2008",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902930~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "X",
}
@Article{Kruh:1986:CSEb,
author = "Louis Kruh",
title = "{18th Century} Shorthand Expert Needed (Re-Run)",
journal = j-CRYPTOLOGIA,
volume = "10",
number = "2",
pages = "126--127",
month = apr,
year = "1986",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118691860921",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:46 MDT 2008",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902931~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "X",
}
@Article{Anonymous:1986:BCb,
author = "Anonymous",
title = "Biographies of Contributors",
journal = j-CRYPTOLOGIA,
volume = "10",
number = "2",
pages = "128--128",
month = apr,
year = "1986",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118691860930",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:46 MDT 2008",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902932~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "X",
}
@Article{Unknown:1986:DTS,
author = "Unknown",
title = "Has {Dr. Thouless} Survived Death?",
journal = j-CRYPTOLOGIA,
volume = "10",
number = "2",
pages = "??--??",
month = apr,
year = "1986",
CODEN = "CRYPE6",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Sat Nov 21 12:35:16 MST 1998",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "X",
}
@Article{Kruh:1986:CLVb,
author = "Louis Kruh",
title = "Cryptology and the Law --- {VI}",
journal = j-CRYPTOLOGIA,
volume = "10",
number = "3",
pages = "129--133",
month = jul,
year = "1986",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118691860949",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:47 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902934~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "X",
}
@Article{Bloch:1986:EDD,
author = "Gilbert Bloch and Ralph Erskine",
title = "{Enigma}: the Dropping of the Double Encipherment",
journal = j-CRYPTOLOGIA,
volume = "10",
number = "3",
pages = "134--141",
month = jul,
year = "1986",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118691860958",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:47 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902935~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "X",
}
@Article{Outerbridge:1986:SDC,
author = "Richard Outerbridge",
title = "Some Design Criteria for {Feistel}-Cipher Key
Schedules",
journal = j-CRYPTOLOGIA,
volume = "10",
number = "3",
pages = "142--156",
month = jul,
year = "1986",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118691860967",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:47 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902936~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "X",
}
@Article{Desnoyers:1986:CEPb,
author = "Charles-Hubert Desnoyers",
title = "Cryptanalytic Essay --- {Part II}: Solution of Problem
No. 166 Published in Elementary Cryptanalysis",
journal = j-CRYPTOLOGIA,
volume = "10",
number = "3",
pages = "158--183",
month = jul,
year = "1986",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118691860976",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:47 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902937~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "X",
}
@Article{Kruh:1986:RTCb,
author = "Louis Kruh",
title = "Reviews of Things Cryptologic",
journal = j-CRYPTOLOGIA,
volume = "10",
number = "3",
pages = "184--191",
month = jul,
year = "1986",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118691860985",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:47 MDT 2008",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902938~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "X",
}
@Article{Anonymous:1986:BCc,
author = "Anonymous",
title = "Biographies of Contributors",
journal = j-CRYPTOLOGIA,
volume = "10",
number = "3",
pages = "192--192",
month = jul,
year = "1986",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118691860994",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:47 MDT 2008",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902939~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "X",
}
@Article{Carroll:1986:ACS,
author = "John M. Carroll and Steve Martin",
title = "The Automated Cryptanalysis of Substitution Ciphers",
journal = j-CRYPTOLOGIA,
volume = "10",
number = "4",
pages = "193--209",
month = oct,
year = "1986",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118691861001",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:47 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902941~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "X",
}
@Article{Barlow:1986:VMV,
author = "Michael Barlow",
title = "The {Voynich Manuscript} --- By {Voynich}?",
journal = j-CRYPTOLOGIA,
volume = "10",
number = "4",
pages = "210--216",
month = oct,
year = "1986",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118691861010",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:47 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902942~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "X",
}
@Article{Rubin:1986:FKP,
author = "Frank Rubin",
title = "Foiling the Known-Plaintext Attack",
journal = j-CRYPTOLOGIA,
volume = "10",
number = "4",
pages = "217--223",
month = oct,
year = "1986",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118691861029",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:47 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902943~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "X",
}
@Article{Anonymous:1986:FIP,
author = "Anonymous",
title = "Free {IBM-PC} Encryption Software",
journal = j-CRYPTOLOGIA,
volume = "10",
number = "4",
pages = "224--224",
month = oct,
year = "1986",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118691861038",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:47 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902944~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "X",
}
@Article{Outerbridge:1986:CCC,
author = "Richard Outerbridge",
title = "{Cadbury} Code Confidential",
journal = j-CRYPTOLOGIA,
volume = "10",
number = "4",
pages = "225--226",
month = oct,
year = "1986",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118691861047",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:47 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902945~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "X",
}
@Article{Erskine:1986:LPH,
author = "Ralph Erskine",
title = "{``A Link With Pearl Harbor?''} Book Review",
journal = j-CRYPTOLOGIA,
volume = "10",
number = "4",
pages = "227--229",
month = oct,
year = "1986",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118691861056",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:47 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902946~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "X",
}
@Article{Mache:1986:G,
author = "Wolfgang W. Mache",
title = "{Geheimschreiber}",
journal = j-CRYPTOLOGIA,
volume = "10",
number = "4",
pages = "230--242",
month = oct,
year = "1986",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118691861065",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:47 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902947~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "X",
}
@Article{Deavours:1986:AMG,
author = "Cipher A. Deavours and Louis Kruh",
title = "Appendix: Mechanics of the {German} Telecipher
Machine",
journal = j-CRYPTOLOGIA,
volume = "10",
number = "4",
pages = "243--247",
month = oct,
year = "1986",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118691861074",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:47 MDT 2008",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902948~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "X",
}
@Article{Kruh:1986:CLVc,
author = "Louis Kruh",
title = "Cryptology and the Law --- {VII}",
journal = j-CRYPTOLOGIA,
volume = "10",
number = "4",
pages = "248--253",
month = oct,
year = "1986",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118691861083",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:47 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902949~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "X",
}
@Article{Anonymous:1986:BCd,
author = "Anonymous",
title = "Biographies of Contributors",
journal = j-CRYPTOLOGIA,
volume = "10",
number = "4",
pages = "254--255",
month = oct,
year = "1986",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118691861092",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:47 MDT 2008",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902950~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "X",
}
@Article{Kochanski:1987:SDI,
author = "Martin Kochanski",
title = "A Survey of Data Insecurity Packages",
journal = j-CRYPTOLOGIA,
volume = "11",
number = "1",
pages = "1--15",
month = jan,
year = "1987",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118791861730",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
MRclass = "68P25 (94A60)",
MRnumber = "874 439",
bibdate = "Mon Jun 30 15:38:48 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902995~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "XI",
}
@Article{Winternitz:1987:CKA,
author = "Robert Winternitz and Martin Hellman",
title = "Chosen-Key Attacks on a Block Cipher",
journal = j-CRYPTOLOGIA,
volume = "11",
number = "1",
pages = "16--20",
month = jan,
year = "1987",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118791861749",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:48 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902996~db=all~order=page",
ZMnumber = "654.94008",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "XI",
}
@Article{Levitin:1987:ECT,
author = "Samuel M. Levitin",
title = "Equivalence Classes: Toward More Efficient Search",
journal = j-CRYPTOLOGIA,
volume = "11",
number = "1",
pages = "21--28",
month = jan,
year = "1987",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118791861758",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:48 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902997~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "XI",
}
@Article{Schick:1987:S,
author = "Joseph S. Schick",
title = "With the {849th SIS, 1942--45}",
journal = j-CRYPTOLOGIA,
volume = "11",
number = "1",
pages = "29--39",
month = jan,
year = "1987",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118791861767",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:48 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902998~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "XI",
}
@Article{Hardie:1987:PPC,
author = "Bradford Hardie",
title = "The {POTUS}-Prime Connection: Two Notes (1)
{Roosevelt}, {Churchill}, and Me",
journal = j-CRYPTOLOGIA,
volume = "11",
number = "1",
pages = "40--43",
month = jan,
year = "1987",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118791861776",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:48 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902999~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "XI",
}
@Article{Anonymous:1987:HCM,
author = "Anonymous",
title = "{(2) History of Converter M-134-C Top Secret Chapter
XVIII. the Zero Machine}",
journal = j-CRYPTOLOGIA,
volume = "11",
number = "1",
pages = "44--46",
month = jan,
year = "1987",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118791861785",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:48 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741903000~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "XI",
}
@Article{Deavours:1987:CCK,
author = "C. A. Deavours",
title = "Cryptology Courses at {Kean College}",
journal = j-CRYPTOLOGIA,
volume = "11",
number = "1",
pages = "47--50",
month = jan,
year = "1987",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118791861794",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:48 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741903001~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "XI",
}
@Article{Kruh:1987:RTCa,
author = "Louis Kruh",
title = "Reviews and Things Cryptologic",
journal = j-CRYPTOLOGIA,
volume = "11",
number = "1",
pages = "51--63",
month = jan,
year = "1987",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118791861802",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:48 MDT 2008",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741903002~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "XI",
}
@Article{Bundy:1987:SMW,
author = "William P. Bundy",
title = "Some of My Wartime Experiences",
journal = j-CRYPTOLOGIA,
volume = "11",
number = "2",
pages = "65--77",
month = apr,
year = "1987",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118791861811",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:49 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741903005~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "XI",
}
@Article{Beesly:1987:WWT,
author = "Patrick Beesly",
title = "Who Was the Third Man at {Pyry}?",
journal = j-CRYPTOLOGIA,
volume = "11",
number = "2",
pages = "78--80",
month = apr,
year = "1987",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118791861820",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:49 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741903006~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "XI",
}
@Article{Kahn:1987:CBF,
author = "David Kahn",
title = "The Codebreaker Behind the Footlights",
journal = j-CRYPTOLOGIA,
volume = "11",
number = "2",
pages = "81--84",
month = apr,
year = "1987",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118791861839",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
MRclass = "01A70",
MRnumber = "888 009",
bibdate = "Mon Jun 30 15:38:49 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741903007~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "XI",
}
@Article{Gouaz:1987:NHS,
author = "Linda Y. Gouaz",
title = "Needles and Haystacks: the Search for {Ultra} in the
1930's (An Excerpt)",
journal = j-CRYPTOLOGIA,
volume = "11",
number = "2",
pages = "85--92",
month = apr,
year = "1987",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118791861848",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:49 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741903008~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "XI",
}
@Article{Gillogly:1987:BEC,
author = "James J. Gillogly",
title = "Breaking An {Eighteenth Century} Shorthand System",
journal = j-CRYPTOLOGIA,
volume = "11",
number = "2",
pages = "93--98",
month = apr,
year = "1987",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118791861857",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:49 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741903009~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "XI",
}
@Article{Anonymous:1987:CCC,
author = "Anonymous",
title = "{Cadbury} Caper or Cipher?",
journal = j-CRYPTOLOGIA,
volume = "11",
number = "2",
pages = "99--101",
month = apr,
year = "1987",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118791861866",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:49 MDT 2008",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741903010~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "XI",
}
@Article{Rubin:1987:FEK,
author = "Frank Rubin",
title = "Foiling An Exhaustive Key-Search Attack",
journal = j-CRYPTOLOGIA,
volume = "11",
number = "2",
pages = "102--107",
month = apr,
year = "1987",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118791861875",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:49 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib;
Theory/crypto.security.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741903011~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "XI",
}
@Article{Michener:1987:UCN,
author = "John R. Michener",
title = "The Use of Complete, Nonlinear, Block Codes for
Nonlinear, Noninvertible Mixing of Pseudorandom
Sequences",
journal = j-CRYPTOLOGIA,
volume = "11",
number = "2",
pages = "108--111",
month = apr,
year = "1987",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118791861884",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:49 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741903012~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "XI",
}
@Article{Richardson:1987:DES,
author = "Robert M. Richardson",
title = "{Digital Encryption Standard Users Group}",
journal = j-CRYPTOLOGIA,
volume = "11",
number = "2",
pages = "112--114",
month = apr,
year = "1987",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118791861893",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:49 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741903013~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "XI",
}
@Article{Cheatham:1987:MDS,
author = "Tom Cheatham",
title = "Message Decryption and Spelling Checkers",
journal = j-CRYPTOLOGIA,
volume = "11",
number = "2",
pages = "115--118",
month = apr,
year = "1987",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118791861901",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:49 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741903014~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
keywords = "security",
romanvolume = "XI",
subject = "E.3 Data, DATA ENCRYPTION \\ D.4.6 Software, OPERATING
SYSTEMS, Security and Protection, Cryptographic
controls",
}
@Article{Kruh:1987:OCD,
author = "Louis Kruh",
title = "An Obscure Cryptographic Device",
journal = j-CRYPTOLOGIA,
volume = "11",
number = "2",
pages = "119--122",
month = apr,
year = "1987",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118791861910",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:49 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741903015~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "XI",
}
@Article{Kruh:1987:RTCb,
author = "Louis Kruh",
title = "Reviews and Things Cryptologic",
journal = j-CRYPTOLOGIA,
volume = "11",
number = "2",
pages = "123--128",
month = apr,
year = "1987",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118791861929",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:49 MDT 2008",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741903016~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "XI",
}
@Article{Whitaker:1987:BPB,
author = "Paul Whitaker and Louis Kruh",
title = "From {Bletchley Park} to {Berchtesgaden}",
journal = j-CRYPTOLOGIA,
volume = "11",
number = "3",
pages = "129--141",
month = jul,
year = "1987",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118791861938",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:49 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741903018~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "XI",
}
@Article{Bloch:1987:EBUa,
author = "Gilbert Bloch and C. A. Deavours",
title = "{ENIGMA} Before {ULTRA}: {Polish} Work and the
{French} Contribution",
journal = j-CRYPTOLOGIA,
volume = "11",
number = "3",
pages = "142--155",
month = jul,
year = "1987",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118791861947",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:49 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
note = "Translated by C. A. Deavours. Reprinted in \cite[pp.
373--386]{Deavours:1998:SCH}.",
URL = "http://www.informaworld.com/smpp/content~content=a741903019~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "XI",
}
@Article{Kruh:1987:SVF,
author = "Louis Kruh",
title = "The Shortsighted View of a Foresighted {Admiral}",
journal = j-CRYPTOLOGIA,
volume = "11",
number = "3",
pages = "156--159",
month = jul,
year = "1987",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118791861956",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:49 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741903020~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "XI",
}
@Article{Anonymous:1987:AMN,
author = "Anonymous",
title = "From the Archives: Memorandum on Non-Military Codes
and Ciphers",
journal = j-CRYPTOLOGIA,
volume = "11",
number = "3",
pages = "160--161",
month = jul,
year = "1987",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118791861965",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:49 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741903021~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "XI",
}
@Article{Deavours:1987:SBT,
author = "C. A. Deavours",
title = "Sois Belle et Tais-Toi",
journal = j-CRYPTOLOGIA,
volume = "11",
number = "3",
pages = "162--165",
month = jul,
year = "1987",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118791861974",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:49 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741903022~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "XI",
}
@Article{Michener:1987:AKD,
author = "John R. Michener",
title = "The Application of Key Dependent and Variable Rotor
Sets to Generalized Rotor Cryptographic Systems",
journal = j-CRYPTOLOGIA,
volume = "11",
number = "3",
pages = "166--171",
month = jul,
year = "1987",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118791861983",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:49 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741903023~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "XI",
}
@Article{Sancho:1987:EMD,
author = "Justo Sancho",
title = "Enumeration of multivariable decipherable {Boolean}
functions",
journal = j-CRYPTOLOGIA,
volume = "11",
number = "3",
pages = "172--181",
month = jul,
year = "1987",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118791861992",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
MRclass = "94A60",
MRnumber = "88f:94032",
MRreviewer = "D. Lieberman",
bibdate = "Mon Jun 30 15:38:49 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741903024~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "XI",
}
@Article{Kak:1987:SIS,
author = "Subhash C. Kak",
title = "The Study of the {Indus} Script General
Considerations",
journal = j-CRYPTOLOGIA,
volume = "11",
number = "3",
pages = "182--191",
month = jul,
year = "1987",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118791862009",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:49 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741903025~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "XI",
}
@Article{Carroll:1987:ACP,
author = "John M. Carroll and Lynda Robbins",
title = "The Automated Cryptanalysis of Polyalphabetic
Ciphers",
journal = j-CRYPTOLOGIA,
volume = "11",
number = "4",
pages = "193--205",
month = oct,
year = "1987",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118791862018",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:50 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741903027~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "XI",
}
@Article{Bennett:1987:AEA,
author = "John Bennett",
title = "Analysis of the Encryption Algorithm Used in the
{WordPerfect} Word Processing Program",
journal = j-CRYPTOLOGIA,
volume = "11",
number = "4",
pages = "206--210",
month = oct,
year = "1987",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118791862027",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:50 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741903028~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "XI",
}
@Article{Levine:1987:SFC,
author = "Jack Levine and Richard Chandler",
title = "Some further cryptographic applications of permutation
polynomials",
journal = j-CRYPTOLOGIA,
volume = "11",
number = "4",
pages = "211--218",
month = oct,
year = "1987",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118791862036",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
MRclass = "11T71 (94A60)",
MRnumber = "88m:11108",
MRreviewer = "Bernard J. M. Smeets",
bibdate = "Mon Jun 30 15:38:50 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741903029~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "XI",
}
@Article{Clarke:1987:GCC,
author = "William F. Clarke",
title = "{Government Code and Cypher School}: Its Foundation
and Development With Special Reference to Its {Naval}
Side",
journal = j-CRYPTOLOGIA,
volume = "11",
number = "4",
pages = "219--226",
month = oct,
year = "1987",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118791862045",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:50 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741903030~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "XI",
}
@Article{Bloch:1987:EBUb,
author = "Gilbert Bloch and C. A. Deavours",
title = "{Enigma} Before {Ultra}: the {Polish} Success and
Check (1933--1939)",
journal = j-CRYPTOLOGIA,
volume = "11",
number = "4",
pages = "227--234",
month = oct,
year = "1987",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118791862054",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:50 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
note = "Translated by C. A. Deavours. Reprinted in \cite[pp.
387--394]{Deavours:1998:SCH}.",
URL = "http://www.informaworld.com/smpp/content~content=a741903031~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "XI",
xxtitle = "{Enigma} Before {Ultra}: {Polish} Success and Check
(1933--1939)",
}
@Article{Erskine:1987:NEM,
author = "Ralph Erskine and Frode Weierud",
title = "{Naval Enigma}: {M4} and Its Rotors",
journal = j-CRYPTOLOGIA,
volume = "11",
number = "4",
pages = "235--244",
month = oct,
year = "1987",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118791862063",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:50 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741903032~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "XI",
}
@Article{Kruh:1987:BRC,
author = "Louis Kruh",
title = "{British Rockex} Cipher Machines",
journal = j-CRYPTOLOGIA,
volume = "11",
number = "4",
pages = "245--247",
month = oct,
year = "1987",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118791862072",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:50 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741903033~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "XI",
}
@Article{Kruh:1987:RTCc,
author = "Louis Kruh and Ralph Erskine",
title = "Reviews and Things Cryptologic",
journal = j-CRYPTOLOGIA,
volume = "11",
number = "4",
pages = "248--253",
month = oct,
year = "1987",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118791862081",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:50 MDT 2008",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741903034~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "XI",
}
@Article{Barlow:1988:VS,
author = "Michael Barlow",
title = "{Voynich} Solved?",
journal = j-CRYPTOLOGIA,
volume = "12",
number = "??",
pages = "??--??",
month = "????",
year = "1988",
CODEN = "CRYPE6",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Sat Nov 21 12:35:16 MST 1998",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "XII",
}
@Article{Pearson:1988:CCC,
author = "Peter K. Pearson",
title = "Cryptanalysis of the {Ciarcia Circuit Cellar Data
Encryptor}",
journal = j-CRYPTOLOGIA,
volume = "12",
number = "1",
pages = "1--10",
month = jan,
year = "1988",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118891862738",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:51 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741903097~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "XII",
}
@Article{Hammer:1988:SOH,
author = "Carl Hammer",
title = "Second Order Homophonic Ciphers",
journal = j-CRYPTOLOGIA,
volume = "12",
number = "1",
pages = "11--20",
month = jan,
year = "1988",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118891862747",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:51 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741903098~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "XII",
}
@Article{Michener:1988:RDE,
author = "John Michener",
title = "Recent Developments in Electronic Circuitry and Their
Effects on the Implementation of
Substitution-Permutation Block Codes",
journal = j-CRYPTOLOGIA,
volume = "12",
number = "1",
pages = "21--24",
month = jan,
year = "1988",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118891862756",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:51 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741903099~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "XII",
}
@Article{Rubin:1988:CUP,
author = "Frank Rubin",
title = "The cryptographic uses of {Post} tag systems",
journal = j-CRYPTOLOGIA,
volume = "12",
number = "1",
pages = "25--33",
month = jan,
year = "1988",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118891862765",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
MRclass = "94A60 (03D03 11T71)",
MRnumber = "89e:94010",
MRreviewer = "Kaicheng Lu",
bibdate = "Mon Jun 30 15:38:51 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741903100~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "XII",
}
@Article{Kruh:1988:RTCa,
author = "Louis Kruh and Ralph Erskine and Michael Barlow",
title = "Reviews and Things Cryptologic",
journal = j-CRYPTOLOGIA,
volume = "12",
number = "1",
pages = "37--51",
month = jan,
year = "1988",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118891862774",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:51 MDT 2008",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741903101~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "XII",
}
@Article{Clarke:1988:YB,
author = "William F. Clarke",
title = "The Years Between",
journal = j-CRYPTOLOGIA,
volume = "12",
number = "1",
pages = "52--58",
month = jan,
year = "1988",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118891862783",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:51 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741903102~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "XII",
}
@Article{Erskine:1988:ATD,
author = "Ralph Erskine",
title = "From the Archives: {Tunny} Decrypts",
journal = j-CRYPTOLOGIA,
volume = "12",
number = "1",
pages = "59--61",
month = jan,
year = "1988",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118891862792",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:51 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741903103~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "XII",
}
@Article{Arnold:1988:HYG,
author = "Jonathan P. Arnold",
title = "{Herbert O. Yardley}, Gangbuster",
journal = j-CRYPTOLOGIA,
volume = "12",
number = "1",
pages = "62--64",
month = jan,
year = "1988",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118891862800",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:51 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741903104~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "XII",
}
@Article{Kruh:1988:SBC,
author = "Louis Kruh",
title = "{Stimson}, the {Black Chamber}, and the {``Gentlemen's
Mail''} Quote",
journal = j-CRYPTOLOGIA,
volume = "12",
number = "2",
pages = "65--89",
month = apr,
year = "1988",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118891862819",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:51 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741903107~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "XII",
}
@Article{Clarke:1988:BP,
author = "William F. Clarke",
title = "{Bletchley Park} 1941--1945",
journal = j-CRYPTOLOGIA,
volume = "12",
number = "2",
pages = "90--97",
month = apr,
year = "1988",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118891862828",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:51 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
note = "Reprinted in \cite[pp. 227--234]{Deavours:1998:SCH}.",
URL = "http://www.informaworld.com/smpp/content~content=a741903108~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "XII",
}
@Article{Erskine:1988:AUB,
author = "Ralph Erskine",
title = "From the Archives: {U}-Boat {HF WT} Signalling",
journal = j-CRYPTOLOGIA,
volume = "12",
number = "2",
pages = "98--106",
month = apr,
year = "1988",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118891862837",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:51 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741903109~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "XII",
}
@Article{Wayner:1988:RRC,
author = "Peter Wayner",
title = "A Redundancy Reducing Cipher",
journal = j-CRYPTOLOGIA,
volume = "12",
number = "2",
pages = "107--112",
month = apr,
year = "1988",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118891862846",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:51 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741903110~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "XII",
}
@Article{Kak:1988:AC,
author = "Subhash Kak",
title = "The {{\=A}ryabha{\d{t}}a} cipher",
journal = j-CRYPTOLOGIA,
volume = "12",
number = "2",
pages = "113--117",
month = apr,
year = "1988",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118891862855",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
MRclass = "11T71 (01A32)",
MRnumber = "89f:11165",
MRreviewer = "Hans K. Kaiser",
bibdate = "Mon Jun 30 15:38:51 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741903111~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "XII",
}
@Article{Kruh:1988:RTCb,
author = "Louis Kruh",
title = "Reviews and Things Cryptologic",
journal = j-CRYPTOLOGIA,
volume = "12",
number = "2",
pages = "118--127",
month = apr,
year = "1988",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118891862864",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:51 MDT 2008",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741903112~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "XII",
}
@Article{Kak:1988:FAI,
author = "Subhash C. Kak",
title = "A Frequency Analysis of the {Indus} Script",
journal = j-CRYPTOLOGIA,
volume = "12",
number = "3",
pages = "129--143",
month = jul,
year = "1988",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118891862873",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:52 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741903114~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "XII",
}
@Article{Ellison:1988:SHM,
author = "Carl M. Ellison",
title = "A solution of the {Hebern} messages",
journal = j-CRYPTOLOGIA,
volume = "12",
number = "3",
pages = "144--158",
month = jul,
year = "1988",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118891862882",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
MRclass = "94A60",
MRnumber = "89g:94024",
bibdate = "Mon Jun 30 15:38:52 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741903115~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "XII",
}
@Article{Jamnig:1988:SRC,
author = "Peter Jamnig",
title = "Securing the {RSA}-cryptosystem against cycling
attacks",
journal = j-CRYPTOLOGIA,
volume = "12",
number = "3",
pages = "159--164",
month = jul,
year = "1988",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118891862891",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
MRclass = "94A60 (11T71 68P25)",
MRnumber = "89k:94047",
MRreviewer = "Thomas Beth",
bibdate = "Mon Jun 30 15:38:52 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741903116~db=all~order=page",
ZMnumber = "654.94009",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "XII",
}
@Article{Kochanski:1988:ADI,
author = "Martin Kochanski",
title = "Another Data Insecurity Package",
journal = j-CRYPTOLOGIA,
volume = "12",
number = "3",
pages = "165--173 (or 165--177??)",
month = jul,
year = "1988",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118891862909",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:52 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741903117~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "XII",
}
@Article{Clarke:1988:PWO,
author = "William F. Clarke",
title = "Post War Organization",
journal = j-CRYPTOLOGIA,
volume = "12",
number = "3",
pages = "174--177",
month = jul,
year = "1988",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118891862918",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:52 MDT 2008",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741903118~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "XII",
}
@Article{Bloch:1988:EAU,
author = "Gilbert Bloch and C. A. Deavours",
title = "{Enigma} Avant {Ultra}, {Enigma} Before {Ultra}",
journal = j-CRYPTOLOGIA,
volume = "12",
number = "3",
pages = "178--184",
month = jul,
year = "1988",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118891862927",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:52 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
note = "Translated by C. A. Deavours. Reprinted in \cite[pp.
395--401]{Deavours:1998:SCH}.",
URL = "http://www.informaworld.com/smpp/content~content=a741903119~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "XII",
}
@Article{Kruh:1988:RTCc,
author = "Louis Kruh",
title = "Reviews and Things Cryptologic",
journal = j-CRYPTOLOGIA,
volume = "12",
number = "3",
pages = "185--192",
month = jul,
year = "1988",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118891862936",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:52 MDT 2008",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741903120~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "XII",
}
@Article{Carroll:1988:UBD,
author = "John M. Carroll and Lynda E. Robbins",
title = "Using binary derivatives to test an enhancement of
{DES}",
journal = j-CRYPTOLOGIA,
volume = "12",
number = "4",
pages = "193--208",
month = oct,
year = "1988",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118891862945",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
MRclass = "94A60 (68P25)",
MRnumber = "89i:94029",
MRreviewer = "Yvo Desmedt",
bibdate = "Mon Jun 30 15:38:53 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741908083~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "XII",
}
@Article{Miller:1988:CTR,
author = "Donald V. Miller",
title = "Cryptanalysis of a Two Round Version of {DES} Using
Index Implications",
journal = j-CRYPTOLOGIA,
volume = "12",
number = "4",
pages = "209--219",
month = oct,
year = "1988",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118891862954",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:53 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741908084~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "XII",
}
@Article{Matthews:1988:EMF,
author = "Robert Matthews",
title = "An Empirical Method for Finding the Keylength of
Periodic Ciphers",
journal = j-CRYPTOLOGIA,
volume = "12",
number = "4",
pages = "220--224",
month = oct,
year = "1988",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118891862963",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:53 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741908085~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "XII",
}
@Article{Kurosawa:1988:PKC,
author = "Kaoru Kurosawa and Toshiya Ito and Masashi Takeuchi",
title = "Public key cryptosystem using a reciprocal number with
the same intractability as factoring a large number",
journal = j-CRYPTOLOGIA,
volume = "12",
number = "4",
pages = "225--233",
month = oct,
year = "1988",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118891862972",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
MRclass = "94A60 (11T71 11Y16)",
MRnumber = "89k:94049",
MRreviewer = "Zhen Fu Cao",
bibdate = "Mon Jun 30 15:38:53 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741908086~db=all~order=page",
ZMnumber = "654.94010",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "XII",
}
@Article{Polis:1988:ENA,
author = "Richard I. Polis",
title = "{European} Needs and Attitudes Towards Information
Security",
journal = j-CRYPTOLOGIA,
volume = "12",
number = "4",
pages = "234--239",
month = oct,
year = "1988",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118891862981",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:53 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741908087~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "XII",
}
@Article{Kruh:1988:PMC,
author = "Louis Kruh and Johnnie Murray",
title = "A Pulp Magazine Cipher",
journal = j-CRYPTOLOGIA,
volume = "12",
number = "4",
pages = "240--240",
month = oct,
year = "1988",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118891862990",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:53 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741908088~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "XII",
}
@Article{Kruh:1988:BCB,
author = "Louis Kruh",
title = "The {Beale Cipher} As a Bamboozlement --- {Part II}",
journal = j-CRYPTOLOGIA,
volume = "12",
number = "4",
pages = "241--246",
month = oct,
year = "1988",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118891863007",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:53 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741908089~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "XII",
}
@Article{Deavours:1988:ISB,
author = "C. A. Deavours",
title = "Interactive Solution of {Beaufort} Enciphered Text
With Overlapping Keys",
journal = j-CRYPTOLOGIA,
volume = "12",
number = "4",
pages = "247--255",
month = oct,
year = "1988",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118891863016",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:53 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741908090~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "XII",
}
@Article{Barlow:1988:MWB,
author = "Mike Barlow",
title = "A Mathematical Word Block Cipher",
journal = j-CRYPTOLOGIA,
volume = "12",
number = "4",
pages = "256--264",
month = oct,
year = "1988",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118891863025",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:53 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741908091~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "XII",
}
@Article{Kruh:1988:RTCd,
author = "Louis Kruh",
title = "Reviews and Things Cryptologic",
journal = j-CRYPTOLOGIA,
volume = "12",
number = "4",
pages = "265--269",
month = oct,
year = "1988",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118891863034",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:53 MDT 2008",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741908092~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "XII",
}
@Article{Levine:1989:HCS,
author = "Jack Levine and Richard Chandler",
title = "The {Hill} cryptographic system with unknown cipher
alphabet but known plaintext",
journal = j-CRYPTOLOGIA,
volume = "13",
number = "1",
pages = "1--28",
month = jan,
year = "1989",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118991863736",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
MRclass = "94A60",
MRnumber = "90a:94038",
MRreviewer = "Shimshon Berkovits",
bibdate = "Mon Jun 30 15:38:53 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902534~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "XIII",
}
@Article{Matthews:1989:DCE,
author = "Robert Matthews",
title = "On the derivation of a ``chaotic'' encryption
algorithm",
journal = j-CRYPTOLOGIA,
volume = "13",
number = "1",
pages = "29--42",
month = jan,
year = "1989",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118991863745",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
MRclass = "94A60 (26A18 58F08)",
MRnumber = "90g:94015",
bibdate = "Mon Jun 30 15:38:53 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902535~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "XIII",
}
@Article{Belkora:1989:BHC,
author = "Jeff Belkora",
title = "{Belkoranic} Hill Ciphering",
journal = j-CRYPTOLOGIA,
volume = "13",
number = "1",
pages = "43--49",
month = jan,
year = "1989",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118991863754",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:53 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902536~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "XIII",
}
@Article{Greenfield:1989:CCU,
author = "Gary R. Greenfield",
title = "A Cryptography Course for the {University of
Richmond}",
journal = j-CRYPTOLOGIA,
volume = "13",
number = "1",
pages = "50--60",
month = jan,
year = "1989",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118991863763",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:53 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902537~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "XIII",
}
@Article{Anderson:1989:CPS,
author = "Roland Anderson",
title = "Cryptanalytic Properties of Short Substitution
Ciphers",
journal = j-CRYPTOLOGIA,
volume = "13",
number = "1",
pages = "61--72",
month = jan,
year = "1989",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118991863772",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
MRclass = "94A60",
MRnumber = "90a:94035",
MRreviewer = "Shimshon Berkovits",
bibdate = "Mon Jun 30 15:38:53 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902538~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "XIII",
}
@Article{Kak:1989:NMC,
author = "Subhash C. Kak",
title = "A New Method for Coin Flipping by Telephone",
journal = j-CRYPTOLOGIA,
volume = "13",
number = "1",
pages = "73--78",
month = jan,
year = "1989",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118991863781",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
MRclass = "94A60 (68P25)",
MRnumber = "90a:94037",
bibdate = "Mon Jun 30 15:38:53 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902539~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "XIII",
}
@Article{Kruh:1989:HCA,
author = "Louis Kruh",
title = "The Heraldry of Cryptology --- Addendum",
journal = j-CRYPTOLOGIA,
volume = "13",
number = "1",
pages = "79--84",
month = jan,
year = "1989",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118991863790",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:53 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902540~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "XIII",
}
@Article{Kruh:1989:RTCa,
author = "Louis Kruh and Ralph Erskine",
title = "Reviews and Things Cryptologic",
journal = j-CRYPTOLOGIA,
volume = "13",
number = "1",
pages = "85--96",
month = jan,
year = "1989",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118991863808",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:53 MDT 2008",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902541~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "XIII",
}
@Article{Mache:1989:SCT,
author = "Wolfgang W. Mache",
title = "The {Siemens} Cipher Teletype in the History of
Telecommunications",
journal = j-CRYPTOLOGIA,
volume = "13",
number = "2",
pages = "97--117",
month = apr,
year = "1989",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118991863817",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:54 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
note = "Reprinted in \cite[pp. 433--453]{Deavours:1998:SCH}.",
URL = "http://www.informaworld.com/smpp/content~content=a741902544~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "XIII",
}
@Article{Clarke:1989:PWO,
author = "William F. Clarke",
title = "Post War Organization",
journal = j-CRYPTOLOGIA,
volume = "13",
number = "2",
pages = "118--122",
month = apr,
year = "1989",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118991863826",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:54 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902545~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "XIII",
}
@Article{Kruh:1989:BAC,
author = "Louis Kruh",
title = "{British--American} Cryptanalytic Cooperation and an
Unprecedented Admission by {Winston Churchill}",
journal = j-CRYPTOLOGIA,
volume = "13",
number = "2",
pages = "123--134",
month = apr,
year = "1989",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118991863835",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:54 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902546~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "XIII",
}
@Article{Erskine:1989:ABP,
author = "Ralph Erskine",
title = "From the Archives: a {Bletchley Park} Assessment of
{German} Intelligence on {Torch}",
journal = j-CRYPTOLOGIA,
volume = "13",
number = "2",
pages = "135--142",
month = apr,
year = "1989",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118991863844",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:54 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902547~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "XIII",
}
@Article{Myer:1989:VCS,
author = "Lt. Gen. Charles R. Myer",
title = "{Viet Cong} {Sigint} and {U.S. Army COMSEC} in
{Vietnam}",
journal = j-CRYPTOLOGIA,
volume = "13",
number = "2",
pages = "143--150",
month = apr,
year = "1989",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118991863853",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:54 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
note = "Reprinted in \cite[pp. 301--308]{Deavours:1998:SCH}.",
URL = "http://www.informaworld.com/smpp/content~content=a741902548~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "XIII",
}
@Article{Georgiou:1989:MSC,
author = "George Georgiou",
title = "A Method to Strengthen Ciphers",
journal = j-CRYPTOLOGIA,
volume = "13",
number = "2",
pages = "151--160",
month = apr,
year = "1989",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118991863862",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
MRclass = "94A60 (68P25)",
MRnumber = "90e:94021",
MRreviewer = "Yvo Desmedt",
bibdate = "Mon Jun 30 15:38:54 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902549~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "XIII",
}
@Article{Anderson:1989:RCP,
author = "Roland Anderson",
title = "Recognizing Complete and Partial Plaintext",
journal = j-CRYPTOLOGIA,
volume = "13",
number = "2",
pages = "161--166",
month = apr,
year = "1989",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118991863871",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:54 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902550~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "XIII",
}
@Article{Guillou:1989:PKT,
author = "Louis C. Guillou and Marc Davio and Jean-Jacques
Quisquater",
title = "Public-Key Techniques: Randomness and Redundancy",
journal = j-CRYPTOLOGIA,
volume = "13",
number = "2",
pages = "167--189",
month = apr,
year = "1989",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118991863880",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:54 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902551~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "XIII",
}
@Article{Kahn:1989:SWO,
author = "David Kahn",
title = "A {Soviet} Wiretapping Office",
journal = j-CRYPTOLOGIA,
volume = "13",
number = "2",
pages = "190--191",
month = apr,
year = "1989",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118991863899",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:54 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902552~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "XIII",
}
@Article{Boyd:1989:AUS,
author = "Carl Boyd",
title = "Anguish under Siege: High-Grade {Japanese} Signal
Intelligence and the Fall of {Berlin}",
journal = j-CRYPTOLOGIA,
volume = "13",
number = "3",
pages = "193--209",
month = jul,
year = "1989",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118991863907",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:55 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902554~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "XIII",
}
@Article{Deavours:1989:KKK,
author = "C. A. Deavours",
title = "A {Ku Klux Klan} Cipher",
journal = j-CRYPTOLOGIA,
volume = "13",
number = "3",
pages = "210--214",
month = jul,
year = "1989",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118991863916",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:55 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902555~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "XIII",
}
@Article{Kruh:1989:RTCb,
author = "Louis Kruh",
title = "Reviews and Things Cryptologic",
journal = j-CRYPTOLOGIA,
volume = "13",
number = "3",
pages = "215--242",
month = jul,
year = "1989",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118991863925",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:55 MDT 2008",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902556~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "XIII",
}
@Article{Wheeler:1989:PCC,
author = "Daniel D. Wheeler",
title = "Problems With Chaotic Cryptosystems",
journal = j-CRYPTOLOGIA,
volume = "13",
number = "3",
pages = "243--250",
month = jul,
year = "1989",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118991863934",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:55 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902557~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "XIII",
}
@Article{Deavours:1989:SHC,
author = "C. A. Deavours and Louis Kruh",
title = "The {Swedish HC-9} Ciphering Machine",
journal = j-CRYPTOLOGIA,
volume = "13",
number = "3",
pages = "251--265",
month = jul,
year = "1989",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118991863943",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:55 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902558~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "XIII",
}
@Article{Matthews:1989:RDP,
author = "Robert Matthews",
title = "A Rotor Device for Periodic and Random-Key
Encryption",
journal = j-CRYPTOLOGIA,
volume = "13",
number = "3",
pages = "266--272",
month = jul,
year = "1989",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118991863952",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:55 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902559~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "XIII",
}
@Article{Blackman:1989:GCS,
author = "Deane R. Blackman",
title = "The {Gromark} Cipher, and Some Relatives",
journal = j-CRYPTOLOGIA,
volume = "13",
number = "3",
pages = "273--282",
month = jul,
year = "1989",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118991863961",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:55 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902560~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "XIII",
}
@Article{Unknown:1989:OCP,
author = "Unknown",
title = "{OSS} Cryptographic Plan",
journal = j-CRYPTOLOGIA,
volume = "13",
number = "3",
pages = "283--287",
month = jul,
year = "1989",
CODEN = "CRYPE6",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Sat Nov 21 12:35:16 MST 1998",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
remark = "1945 U.S. Army staff study obtained under FOIA.",
romanvolume = "XIII",
}
@Article{August:1989:CEC,
author = "David A. August",
title = "Cryptography and Exploitation of {Chinese} Manual
Cryptosystems: {Part I}: The Encoding Problem",
journal = j-CRYPTOLOGIA,
volume = "13",
number = "4",
pages = "289--302",
month = oct,
year = "1989",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118991863970",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:55 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902562~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "XIII",
}
@Article{Carroll:1989:CCP,
author = "John M. Carroll and Lynda E. Robbins",
title = "Computer Cryptanalysis of Product Ciphers",
journal = j-CRYPTOLOGIA,
volume = "13",
number = "4",
pages = "303--326",
month = oct,
year = "1989",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118991863989",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:55 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902563~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "XIII",
}
@Article{Kruh:1989:TYS,
author = "Louis Kruh",
title = "Tales of {Yardley}: Some Sidelights to His Career",
journal = j-CRYPTOLOGIA,
volume = "13",
number = "4",
pages = "327--358",
month = oct,
year = "1989",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118991863998",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:55 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902564~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "XIII",
}
@Article{August:1989:ITA,
author = "David August",
title = "Information theoretic approach to secure {LSFR}
ciphers",
journal = j-CRYPTOLOGIA,
volume = "13",
number = "4",
pages = "351--359",
month = oct,
year = "1989",
CODEN = "CRYPE6",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
MRclass = "94A60",
bibdate = "Fri Feb 09 18:12:03 2001",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
ZMnumber = "651.94006",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "XIII",
}
@Article{Kruh:1989:RTCc,
author = "Louis Kruh",
title = "Reviews and Things Cryptologic",
journal = j-CRYPTOLOGIA,
volume = "13",
number = "4",
pages = "359--377",
month = oct,
year = "1989",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-118991864005",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:55 MDT 2008",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902565~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "XIII",
}
@Article{Unknown:1989:ACN,
author = "Unknown",
title = "From the archives: Compromise of a {Navy} Code",
journal = j-CRYPTOLOGIA,
volume = "13",
number = "4",
pages = "378--381",
month = oct,
year = "1989",
CODEN = "CRYPE6",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Sat Nov 21 12:35:16 MST 1998",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
remark = "925 document on a lapse of security.",
romanvolume = "XIII",
}
@Article{Hinsley:1990:BIS,
author = "F. H. Hinsley",
title = "{British} Intelligence in the {Second World War}: An
Overview",
journal = j-CRYPTOLOGIA,
volume = "14",
number = "1",
pages = "1--10",
month = jan,
year = "1990",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-119091864733",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:56 MDT 2008",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib;
OCLC Article1st database",
URL = "http://www.informaworld.com/smpp/content~content=a741902623~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "XIV",
}
@Article{Lewis:1990:DD,
author = "Frank W. Lewis",
title = "The Day of the Dodo",
journal = j-CRYPTOLOGIA,
volume = "14",
number = "1",
pages = "11--27",
month = jan,
year = "1990",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-119091864742",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:56 MDT 2008",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib;
OCLC Article1st database",
URL = "http://www.informaworld.com/smpp/content~content=a741902624~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "XIV",
}
@Article{Lipson:1990:MCC,
author = "Stanley H. Lipson and Francine Abeles",
title = "The Matrix Cipher of {C. L. Dodgson}",
journal = j-CRYPTOLOGIA,
volume = "14",
number = "1",
pages = "28--36",
month = jan,
year = "1990",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-119091864751",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
MRclass = "01A55 (11T71 94A60)",
MRnumber = "91b:01044",
MRreviewer = "James J. Tattersall",
bibdate = "Mon Jun 30 15:38:56 MDT 2008",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib;
OCLC Article1st database",
URL = "http://www.informaworld.com/smpp/content~content=a741902625~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "XIV",
}
@Article{Vogel:1990:IKC,
author = "Daniel S. Vogel",
title = "Inside a {KGB} Cipher",
journal = j-CRYPTOLOGIA,
volume = "14",
number = "1",
pages = "37--52",
month = jan,
year = "1990",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-119091864760",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:56 MDT 2008",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib;
OCLC Article1st database",
URL = "http://www.informaworld.com/smpp/content~content=a741902626~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "XIV",
xxauthor = "Donald S. Vogel",
}
@Article{Rabson:1990:WOH,
author = "John Rabson and Hugo Rabson",
title = "The {War Office HK POW} Cypher System",
journal = j-CRYPTOLOGIA,
volume = "14",
number = "1",
pages = "53--60",
month = jan,
year = "1990",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-119091864779",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:56 MDT 2008",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib;
OCLC Article1st database",
URL = "http://www.informaworld.com/smpp/content~content=a741902627~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "XIV",
xxauthor = "Hugo Rabson",
}
@Article{August:1990:CEC,
author = "David A. August",
title = "Cryptography and Exploitation of {Chinese} Manual
Cryptosystems. {Part II}: The Encrypting Problem",
journal = j-CRYPTOLOGIA,
volume = "14",
number = "1",
pages = "61--78",
month = jan,
year = "1990",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-119091864788",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:56 MDT 2008",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib;
OCLC Article1st database",
URL = "http://www.informaworld.com/smpp/content~content=a741902628~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "XIV",
}
@Article{Kak:1990:VC,
author = "Subhash C. Kak",
title = "The {Vararuchi} Cipher",
journal = j-CRYPTOLOGIA,
volume = "14",
number = "1",
pages = "79--82",
month = jan,
year = "1990",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-119091864797",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
MRclass = "01A32 (94A60)",
MRnumber = "91b:01020",
MRreviewer = "A. I. Volodarski{\u{\i}}",
bibdate = "Mon Jun 30 15:38:56 MDT 2008",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib;
OCLC Article1st database",
URL = "http://www.informaworld.com/smpp/content~content=a741902629~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "XIV",
}
@Article{Kruh:1990:RTCa,
author = "Louis Kruh",
title = "Reviews and Things Cryptologic",
journal = j-CRYPTOLOGIA,
volume = "14",
number = "1",
pages = "83--89",
month = jan,
year = "1990",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-119091864805",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:56 MDT 2008",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902630~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "XIV",
}
@Article{Donini:1990:CSR,
author = "Rear Admiral (disch.) Luigi Donini and Augusto
Buonafalce",
title = "The Cryptographic Services of the {Royal British} and
{Italian} Navies",
journal = j-CRYPTOLOGIA,
volume = "14",
number = "2",
pages = "97--127",
month = apr,
year = "1990",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-119091864814",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:56 MDT 2008",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib;
OCLC Article1st database",
note = "Translated by Augusto Buonafalce. Reprinted in
\cite[pp. 3--33]{Deavours:1998:SCH}.",
URL = "http://www.informaworld.com/smpp/content~content=a741902633~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "XIV",
xxauthor = "Rear Admiral (disch.) Luigi Donini",
}
@Article{Abeles:1990:SVP,
author = "Francine Abeles and Stanley H. Lipson",
title = "Some {Victorian} Periodic Polyalphabetic Ciphers",
journal = j-CRYPTOLOGIA,
volume = "14",
number = "2",
pages = "128--134",
month = apr,
year = "1990",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-119091864823",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
MRclass = "01A55 (94-03)",
MRnumber = "90m:01018",
bibdate = "Mon Jun 30 15:38:56 MDT 2008",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib;
OCLC Article1st database",
note = "Reprinted in \cite[pp. 309--315]{Deavours:1998:SCH}.",
URL = "http://www.informaworld.com/smpp/content~content=a741902634~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "XIV",
}
@Article{Dunnigan:1990:NCPa,
author = "Brian Leigh Dunnigan and Frank Lewis and Mike Barlow",
title = "The {Niagara} Cipher --- {Part I}",
journal = j-CRYPTOLOGIA,
volume = "14",
number = "2",
pages = "135--138",
month = apr,
year = "1990",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-119091864832",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:56 MDT 2008",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib;
OCLC Article1st database",
URL = "http://www.informaworld.com/smpp/content~content=a741902635~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "XIV",
}
@Article{Deavours:1990:SHC,
author = "C. A. Deavours and Louis Kruh",
title = "The {Swedish HC-9} Ciphering Machine Challenge",
journal = j-CRYPTOLOGIA,
volume = "14",
number = "2",
pages = "139--144",
month = apr,
year = "1990",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-119091864841",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:56 MDT 2008",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib;
OCLC Article1st database",
URL = "http://www.informaworld.com/smpp/content~content=a741902636~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "XIV",
}
@Article{Greenough:1990:CUH,
author = "H. Paul Greenough",
title = "Cryptanalysis of the Uncaged {Hagelin}",
journal = j-CRYPTOLOGIA,
volume = "14",
number = "2",
pages = "145--161",
month = apr,
year = "1990",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-119091864850",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
MRclass = "94A60 (01A99)",
MRnumber = "91a:94023",
bibdate = "Mon Jun 30 15:38:56 MDT 2008",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib;
OCLC Article1st database",
URL = "http://www.informaworld.com/smpp/content~content=a741902637~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "XIV",
}
@Article{Deavours:1990:SCT,
author = "C. A. Deavours",
title = "Solution of {C-35} Texts With Partial Key Overlaps",
journal = j-CRYPTOLOGIA,
volume = "14",
number = "2",
pages = "162--168",
month = apr,
year = "1990",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-119091864869",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
MRclass = "94A60",
MRnumber = "1 047 338",
bibdate = "Mon Jun 30 15:38:56 MDT 2008",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib;
OCLC Article1st database",
URL = "http://www.informaworld.com/smpp/content~content=a741902638~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "XIV",
}
@Article{Kak:1990:IBF,
author = "Subhash C. Kak",
title = "{Indus} and {Brahmi} --- Further Connections",
journal = j-CRYPTOLOGIA,
volume = "14",
number = "2",
pages = "169--183",
month = apr,
year = "1990",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-119091864878",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:56 MDT 2008",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib;
OCLC Article1st database",
URL = "http://www.informaworld.com/smpp/content~content=a741902639~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "XIV",
}
@Article{Kruh:1990:RTCb,
author = "Louis Kruh",
title = "Reviews and Things Cryptologic",
journal = j-CRYPTOLOGIA,
volume = "14",
number = "2",
pages = "184--191",
month = apr,
year = "1990",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-119091864887",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:56 MDT 2008",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902640~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "XIV",
}
@Article{Byrne:1990:CEC,
author = "John Byrne and Cipher A. Deavours and Louis Kruh",
title = "{Chaocipher} Enters the Computer Age When its Method
Is Disclosed to {Cryptologia Editors}",
journal = j-CRYPTOLOGIA,
volume = "14",
number = "3",
pages = "193--198",
month = jul,
year = "1990",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-119091864896",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:57 MDT 2008",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib;
OCLC Article1st database",
note = "Reprinted in \cite[pp. 317--322]{Deavours:1998:SCH}.",
URL = "http://www.informaworld.com/smpp/content~content=a741902642~db=all~order=page",
abstract = "John F. Byrne invented Chaocipher in 1918 (J.F. Byrne,
1953) and tried unsuccessfully for almost 40 years to
interest the US government in his cipher system. In
1989, John Byrne, son of John F. Byrne, demonstrated
Chaocipher to two editors of a cryptology journal to
determine if it had any commercial value. After making
some improvements and providing additional information
they issue a new challenge to would-be solvers and
discuss the computer algorithm for the cipher system",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
keywords = "cryptography; history",
language = "English",
romanvolume = "XIV",
subject = "Cryptologia editors; Chaocipher; US government; cipher
system; cryptology; computer algorithm",
}
@Article{Dunnigan:1990:NCPb,
author = "Brian Leigh Dunnigan and Frank Lewis and Mike Barlow",
title = "The {Niagara} cipher --- {Part II}",
journal = j-CRYPTOLOGIA,
volume = "14",
number = "3",
pages = "199--203",
month = jul,
year = "1990",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-119091864904",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:57 MDT 2008",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib;
OCLC Article1st database",
note = "Niagara cipher; British military cipher;
polyalphabetic cipher",
URL = "http://www.informaworld.com/smpp/content~content=a741902643~db=all~order=page",
abstract = "For pt.I see ibid., vol.14, no.2, p.135--138 (1990).
Cryptanalysis of a British military cipher of 1759
shows the cipher to be a polyalphabetic cipher. This
cipher is described and various ways of solving it
(with and without computers) are demonstrated",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
keywords = "cryptography",
language = "English",
romanvolume = "XIV",
}
@Article{Kozaczuk:1990:NCO,
author = "Wladyslaw Kozaczuk",
title = "A New Challenge for an Old {ENIGMA} --- {Buster}",
journal = j-CRYPTOLOGIA,
volume = "14",
number = "3",
pages = "204--216",
month = jul,
year = "1990",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-119091864913",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:57 MDT 2008",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib;
OCLC Article1st database",
note = "Marian Rejewski; mathematician-cryptologist; Enigma
cipher; enciphered message; Russo-Japanese war; Polish
Socialist Party; historical document",
URL = "http://www.informaworld.com/smpp/content~content=a741902644~db=all~order=page",
abstract = "In 1976, Marian Rejewski, Polish
mathematician-cryptologist, the solver of the German
Enigma cipher, was sent a letter including a photocopy
of an enciphered message, dated 26 April 1904. This was
the period of the Russo-Japanese war. The piece was a
correspondence between the Polish Socialist Party and
its emissaries in London. Despite his advanced age and
prolonged ailment and contrary to his initial
objections, Rejewski solved the cipher, which turned
out to reveal an interesting historical document",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
keywords = "cryptography; history",
language = "English",
romanvolume = "XIV",
}
@Article{Connell:1990:ANM,
author = "Charles Connell",
title = "An Analysis of {NEWDES}: a Modified Version of {DES}",
journal = j-CRYPTOLOGIA,
volume = "14",
number = "3",
pages = "217--224",
month = jul,
year = "1990",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-119091864922",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:57 MDT 2008",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib;
OCLC Article1st database",
note = "NEWDES; modified version; encryption algorithm; data
encryption standard; secretness; S-boxes;
microcomputer; bytes; entire f-function; key length",
URL = "http://www.informaworld.com/smpp/content~content=a741902645~db=all~order=page",
abstract = "An encryption algorithm designed by R Scott (1985)
that is a modified form of the data encryption standard
is examined. Scott's goal in varying DES is to improve
two aspects of it that are alleged to be weaknesses:
the length of the key and the `secretness' of the
design of the S-boxes. An ancillary goal of his is to
provide an algorithm that is easy to implement in
software on a microcomputer. Scott's algorithm is
indeed simple to implement. One of the main reasons for
this is that it uses only operations on entire bytes,
so there is no individual bit manipulation. Also, as
promised, the design of the entire f-function is open
for examination. The increase in key length, however,
may not be as significant as it first appears to be",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
keywords = "cryptography; microcomputer applications; programming;
standards",
language = "English",
romanvolume = "XIV",
}
@Article{Kiele:1990:TTE,
author = "William A. Kiele",
title = "A Tensor --- Theoretic Enhancement to the {Hill}
Cipher System",
journal = j-CRYPTOLOGIA,
volume = "14",
number = "3",
pages = "225--233",
month = jul,
year = "1990",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-119091864931",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
MRclass = "94A60 (11T71)",
MRnumber = "91d:94012",
bibdate = "Mon Jun 30 15:38:57 MDT 2008",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib;
OCLC Article1st database",
note = "tensor-theoretic enhancement; Hill cipher system; Hill
matrix algorithm; purely algebraic cryptographic
system; algebraic cryptology; ring isomorphism theory;
block size; invertible matrix; ciphertext blocks",
URL = "http://www.informaworld.com/smpp/content~content=a741902646~db=all~order=page",
ZMnumber = "715.94002",
abstract = "The Hill matrix algorithm (L.S. Hill, 1929) is known
for being the first purely algebraic cryptographic
system and for starting the entire field of algebraic
cryptology. An operator derived from ring isomorphism
theory is adapted for use in the Hill system which
greatly increases the block size that a matrix can
encrypt; specifically, a $ k \times k $ invertible
matrix over $ Z_n $ represents an invertible matrix of
order $ k^3 $, which produces ciphertext blocks $ k^2
$-times as long as the original matrix could. This
enhancement increases the Hill system's security
considerably",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
keywords = "cryptography; matrix algebra",
language = "English",
romanvolume = "XIV",
}
@Article{Kruh:1990:RTCc,
author = "Louis Kruh",
title = "Reviews and Things Cryptologic",
journal = j-CRYPTOLOGIA,
volume = "14",
number = "3",
pages = "234--252",
month = jul,
year = "1990",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-119091864940",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:57 MDT 2008",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib;
OCLC Article1st database",
URL = "http://www.informaworld.com/smpp/content~content=a741902647~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "XIV",
}
@Article{Kruh:1990:WWS,
author = "Louis Kruh",
title = "Why Was {Safford} Pessimistic About Breaking the
{German ENIGMA} Cipher Machine in 1942?",
journal = j-CRYPTOLOGIA,
volume = "14",
number = "3",
pages = "253--257",
month = jul,
year = "1990",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-119091864959",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:57 MDT 2008",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib;
OCLC Article1st database",
note = "Reprinted in \cite[pp. 235--239]{Deavours:1998:SCH}.",
URL = "http://www.informaworld.com/smpp/content~content=a741902648~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "XIV",
}
@Article{Baldwin:1990:HWS,
author = "Robert W. Baldwin and Alan T. Sherman",
title = "How We Solved the {US\$100,000} Decipher Puzzle (16
Hours Too Late)",
journal = j-CRYPTOLOGIA,
volume = "14",
number = "3",
pages = "258--284",
month = jul,
year = "1990",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-119091864968",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:57 MDT 2008",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib;
OCLC Article1st database",
note = "A preliminary version appears as Technical Report
89-3, Tufts University Department of Computer Science
(July 1989), and in modified form as Technical Report
UMIACS-TR-90-64/CS-TR-2468, University of Maryland,
College Park (May 1990).",
URL = "http://www.informaworld.com/smpp/content~content=a741902649~db=all~order=page",
abstract = "On March 30, 1985 the authors solved a cryptography
puzzle that had remained unsolved for over two years.
Unfortunately, they missed by one day the deadline for
sharing what had become a \$117000 prize. They describe
the puzzle and how they solved it. The \$100000
Decipher Puzzle consists of a simple two-sided jigsaw
puzzle that contains a sequence of 376 codenumbers,
ranging from 1 to 1252, which are encrypted by a
multiple-substitution cipher similar to the Beale
cipher. Clues state that the key was derived from some
keytext in the public domain. The authors solved the
puzzle by building a Zetalisp program that tested
candidate keytexts by trying a variety of ways to
extract candidate keys from each keytext and by
checking the resulting candidate plaintexts for
English. The program exploited a novel `windowing'
technique that detected when part of a candidate key
was correct and an effective test for English based on
digraph frequencies",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
keywords = "cryptography; linguistics; programming; word
processing",
language = "English",
romanvolume = "XIV",
subject = "cryptography puzzle; Decipher Puzzle; two-sided jigsaw
puzzle; codenumbers; multiple-substitution cipher;
Beale cipher; keytext; public domain; Zetalisp program;
candidate keys; candidate plaintexts; English;
windowing; digraph frequencies",
}
@Article{Anderson:1990:SCS,
author = "Ross J. Anderson",
title = "Solving a Class of Stream Ciphers",
journal = j-CRYPTOLOGIA,
volume = "14",
number = "3",
pages = "285--288",
month = jul,
year = "1990",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-119091864977",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:57 MDT 2008",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib;
OCLC Article1st database",
note = "keystream sequences; linear feedback shift registers;
multiplexor; consistency check; observed keystream;
address information",
URL = "http://www.informaworld.com/smpp/content~content=a741902650~db=all~order=page",
abstract = "S. M. Jennings (1980) and H. Beker and F. Piper (1982)
have proposed generating keystream sequences by
combining the output of two linear feedback shift
registers using a multiplexor. Such sequences can be
solved by a consistency check between the observed
keystream and the possible states of the shift register
which provides the address information to the
multiplexor",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
keywords = "cryptography; data integrity; shift registers",
language = "English",
romanvolume = "XIV",
}
@Article{Ritter:1990:SCP,
author = "Terry Ritter",
title = "Substitution Cipher with Pseudo-Random Shuffling The
Dynamic Substitution Combiner",
journal = j-CRYPTOLOGIA,
volume = "14",
number = "4",
pages = "289--303",
month = oct,
year = "1990",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-119091864986",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:58 MDT 2008",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib;
OCLC Article1st database",
note = "pseudo-random shuffling; dynamic substitution
combiner; modified substitution cipher; translation
table; plaintext symbols; ciphertext symbols; dynamic
translation; symbol frequency statistics; cryptanalytic
attacks; cryptographic combiner; exclusive-OR combining
function; Vernam stream ciphers; one-way function;
pseudo-random sequence; cryptanalysis",
URL = "http://www.informaworld.com/smpp/content~content=a741902652~db=all~order=page;
http://www.io.com/~ritter/ARTS/DYNSUB2.HTM",
abstract = "A cipher mechanism or process which can be viewed as a
modified substitution cipher is presented. A
translation table is used to replace plaintext symbols
with ciphertext symbols; the modification consists of
changing the contents of the translation table after
each substitution. The dynamic translation table acts
to confuse symbol frequency statistics and so frustrate
the usual cryptanalytic attacks. The same mechanism can
also be viewed as a cryptographic combiner, and can
replace the exclusive-OR combining function used in
Vernam stream ciphers (G. Vernam, 1926). The dynamic
translation table acts as one-way function to protect
the pseudo-random sequence and consequently helps to
prevent cryptanalysis",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
keywords = "cryptography",
language = "English",
romanvolume = "XIV",
}
@Article{Ephron:1990:C,
author = "Henry D. Ephron",
title = "{S. I. S./CB}",
journal = j-CRYPTOLOGIA,
volume = "14",
number = "4",
pages = "304--330",
month = oct,
year = "1990",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-119091864995",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:58 MDT 2008",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib;
OCLC Article1st database",
note = "Reprinted in \cite[pp. 241--267]{Deavours:1998:SCH}.",
URL = "http://www.informaworld.com/smpp/content~content=a741902653~db=all~order=page",
abstract = "An introduction is given to the Japanese method of
superenciphermant, by means of additives, of their
encoded messages and a detailed description of some of
the author's efforts at solving this
superenciphermant-by means of step-by-step solution of
an imaginary worksheet. Later the Japanese improved the
security of their communications, superenciphering by
passing the digits through a numerical square (a 10*10
table) instead of by mere addition. Encipherment is
demonstrated in detail by means of a step-by-step
solution of an English encoded text superenciphered by
this method",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
keywords = "cryptography",
language = "English",
romanvolume = "XIV",
subject = "Japanese method; superenciphermant; encoded messages;
step-by-step solution; imaginary worksheet; security;
communications; numerical square; English encoded
text",
}
@Article{Deavours:1990:TBW,
author = "C. A. Deavours and Louis Kruh",
title = "The {Turing0} Bombe: Was it Enough?",
journal = j-CRYPTOLOGIA,
volume = "14",
number = "4",
pages = "331--349",
month = oct,
year = "1990",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-119091865002",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:58 MDT 2008",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib;
OCLC Article1st database",
note = "Reprinted in \cite[pp. 403--421]{Deavours:1998:SCH}.",
URL = "http://www.informaworld.com/smpp/content~content=a741902654~db=all~order=page",
abstract = "The effectiveness of Alan Turing's original bombe
design (cipher), is discussed, along with
organizational methods of implementing it via a
microcomputer. to illustrate the material presented, a
three part German Werhmacht message is solved",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
keywords = "cryptography; microcomputer applications",
language = "English",
romanvolume = "XIV",
subject = "Turing bombe; organizational methods; microcomputer;
German Werhmacht message",
}
@Article{Mitchell:1990:NKG,
author = "Douglas W. Mitchell",
title = "Nonlinear Key Generators",
journal = j-CRYPTOLOGIA,
volume = "14",
number = "4",
pages = "350--354",
month = oct,
year = "1990",
CODEN = "CRYPE6",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Fri Mar 15 09:01:38 MST 2002",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib;
OCLC Article1st database",
note = "key generators; nonlinear generation; key sequences;
chaos-based approach; simulations; desirable
properties",
abstract = "A method of nonlinear generation of key sequences is
shown. While D. Wheeler (1989), has shown R. Matthews'
(1989), earlier chaos-based approach to have potential
pitfalls, the present method is shown-in part via
simulations-to be invulnerable to Wheeler's criticisms
and to have various other desirable properties",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
keywords = "cryptography; digital simulation; random number
generation",
language = "English",
romanvolume = "XIV",
}
@Article{Foster:1990:VDC,
author = "Caxton C. Foster",
title = "Vowel Distribution as a Clue to Vowel Identification",
journal = j-CRYPTOLOGIA,
volume = "14",
number = "4",
pages = "355--362",
month = oct,
year = "1990",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-119091865020",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:58 MDT 2008",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib;
OCLC Article1st database",
note = "vowel identification; English; simple substitution
cipher; equally distributed; text",
URL = "http://www.informaworld.com/smpp/content~content=a741902655~db=all~order=page",
abstract = "In any sample of English, about 40\% of the letters
will be vowels. The author tries to identify which
letters of a simple substitution cipher are vowels by
looking for those letters which, as a group, are most
equally distributed through the text",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
keywords = "cryptography; word processing",
language = "English",
romanvolume = "XIV",
}
@Article{Kruh:1990:RTCd,
author = "Louis Kruh",
title = "Reviews and Things Cryptologic",
journal = j-CRYPTOLOGIA,
volume = "14",
number = "4",
pages = "363--373",
month = oct,
year = "1990",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-119091865039",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:58 MDT 2008",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902656~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "XIV",
}
@Article{Weber:1990:MD,
author = "Ralph E. Weber",
title = "A Masked Dispatch",
journal = j-CRYPTOLOGIA,
volume = "14",
number = "4",
pages = "374--380",
month = oct,
year = "1990",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-119091865048",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:58 MDT 2008",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib;
OCLC Article1st database",
URL = "http://www.informaworld.com/smpp/content~content=a741902657~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "XIV",
}
@Article{Ritter:1991:TCP,
author = "Terry Ritter",
title = "Transposition Cipher with Pseudo-random Shuffling: The
Dynamic Transposition Combiner",
journal = j-CRYPTOLOGIA,
volume = "15",
number = "1",
pages = "1--17",
month = jan,
year = "1991",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-119191865731",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:58 MDT 2008",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib;
OCLC Article1st database",
note = "pseudorandom shuffling; dynamic transposition
combiner; transposition cipher; cryptographic
shuffling; bit-balancing data; usage-frequency
statistics; exclusive-OR combining function; Vernam
stream ciphers",
URL = "http://www.informaworld.com/smpp/content~content=a741902738~db=all~order=page;
http://www.io.com/~ritter/ARTS/DYNTRAN2.HTM",
abstract = "Extensions are made to a class of transposition cipher
based on continued shuffling. These ciphers permute
plaintext into ciphertext by swapping every message
element with some message element selected at
pseudo-random; elements can be characters (e.g., bytes)
or bits. Extensions include operation on very large
data blocks, cryptographic shuffling variations, and
the efficient extraction of plaintext from ciphertext.
In addition, selected extra data can be adjoined to the
plaintext to eliminate the data-dependent weak
encipherings otherwise inherent in transposition. This
bit-balancing data is supposed to completely eliminate
all normal usage-frequency statistics from
bit-transposition ciphertext. The same mechanism can
also be viewed as a cryptographic combiner, and, with
sequence-to-block and block-to-sequence conversions,
can generally replace the exclusive-OR combining
function used in Vernam stream ciphers",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
keywords = "cryptography",
language = "English",
romanvolume = "XV",
}
@Article{Lipson:1991:KVC,
author = "Stanley H. Lipson and Francine Abeles",
title = "The Key--Vowel Cipher of {Charles S. Dodgson}",
journal = j-CRYPTOLOGIA,
volume = "15",
number = "1",
pages = "18--24",
month = jan,
year = "1991",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-119191865740",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:58 MDT 2008",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib;
OCLC Article1st database",
note = "Reprinted in \cite[pp. 323--329]{Deavours:1998:SCH}.",
URL = "http://www.informaworld.com/smpp/content~content=a741902739~db=all~order=page",
abstract = "In his diary entry of 23 February 1858, Charles L.
Dodgson (Lewis Carroll) described the first of two
ciphers he invented within three days of each other.
Analyzing this cipher, the authors show that it is a
subset of a Vigen{\'e}re cipher with the addition of
systematically placed nulls. Discussing the key-vowel
cipher and the later one, the matrix cipher, the
authors focus on the security of the key-word. Two
exercises for the reader are also provided",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
keywords = "cryptography",
language = "English",
romanvolume = "XV",
subject = "key-vowel cipher; Vigen{\'e}re cipher; matrix cipher;
security",
}
@Article{Kruh:1991:MIC,
author = "Louis Kruh",
title = "{Military Intelligence Corps Hall of Fame}",
journal = j-CRYPTOLOGIA,
volume = "15",
number = "1",
pages = "25--28",
month = jan,
year = "1991",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-119191865759",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:58 MDT 2008",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib;
OCLC Article1st database",
URL = "http://www.informaworld.com/smpp/content~content=a741902740~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "XV",
}
@Article{Kruh:1991:CCC,
author = "Louis Kruh",
title = "Correspondence in Cipher --- a Cipher Typewriter
Catalogue",
journal = j-CRYPTOLOGIA,
volume = "15",
number = "1",
pages = "29--42",
month = jan,
year = "1991",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-119191865768",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:58 MDT 2008",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib;
OCLC Article1st database",
URL = "http://www.informaworld.com/smpp/content~content=a741902741~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "XV",
}
@Article{Schwartz:1991:NGM,
author = "Charles Schwartz",
title = "A New Graphical Method for Encryption of Computer
Data",
journal = j-CRYPTOLOGIA,
volume = "15",
number = "1",
pages = "43--46",
month = jan,
year = "1991",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-119191865777",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:58 MDT 2008",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib;
OCLC Article1st database",
note = "pseudorandom number generator; decryption; graphical
method; encryption; computer data; text; pictures;
binary files; graphically generated inversions; bit
pattern; uncrackability",
URL = "http://www.informaworld.com/smpp/content~content=a741902742~db=all~order=page",
abstract = "A new method for encryption of computer data (text,
pictures, or binary files) makes use of a sequence of
graphically generated inversions on the bit pattern,
keyed to a pseudo-random number generator. The method
is easy, fast and fun. Decryption requires knowledge of
the secret code number used at encryption. The argument
for `uncrackability' of this scheme is only heuristic;
but the author believes that it is practically immune
from attack. He invites others to see if they can prove
otherwise",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
keywords = "cryptography",
language = "English",
romanvolume = "XV",
}
@Article{Lujan:1991:AMD,
author = "Lt. Susan M. {Lujan, USNR}",
title = "{Agnes Meyer Driscoll}",
journal = j-CRYPTOLOGIA,
volume = "15",
number = "1",
pages = "47--56",
month = jan,
year = "1991",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-119191865786",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:58 MDT 2008",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib;
OCLC Article1st database",
note = "Reprinted in \cite[pp. 269--278]{Deavours:1998:SCH}.",
URL = "http://www.informaworld.com/smpp/content~content=a741902743~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "XV",
}
@Article{Bergen:1991:FSW,
author = "H. A. Bergen and W. J. Caelli",
title = "File Security in {WordPerfect 5.0}",
journal = j-CRYPTOLOGIA,
volume = "15",
number = "1",
pages = "57--66",
month = jan,
year = "1991",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-119191865795",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:58 MDT 2008",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib;
OCLC Article1st database",
note = "file security; files cryptanalysis; locked document
option; word processing package WordPerfect V5.0;
encryption key; ciphertext",
URL = "http://catless.ncl.ac.uk/Risks/12.01.html;
http://www.informaworld.com/smpp/content~content=a741902744~db=all~order=page",
abstract = "Cryptanalysis of files encrypted with the locked
document option of the word processing package
WordPerfect V5.0, is shown to be remarkably simple. The
encryption key and the plaintext are easily recovered
in a ciphertext only attack. File security is thus
compromised and is not in accord with the claim by the
manufacturer that: `If you forget the password, there
is absolutely no way to retrieve the document'",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
keywords = "security of data; software packages; word processing",
language = "English",
romanvolume = "XV",
}
@Article{Kruh:1991:RTCa,
author = "Louis Kruh",
title = "Reviews and Things Cryptologic",
journal = j-CRYPTOLOGIA,
volume = "15",
number = "1",
pages = "67--80",
month = jan,
year = "1991",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-119191865803",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:58 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902745~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "XV",
}
@Article{Ritter:1991:EGC,
author = "Terry Ritter",
title = "The Efficient Generation of Cryptographic Confusion
Sequences",
journal = j-CRYPTOLOGIA,
volume = "15",
number = "2",
pages = "81--139",
month = apr,
year = "1991",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-119191865812",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
MRclass = "94A60 (65C10)",
MRnumber = "92b:94035",
bibdate = "Mon Jun 30 15:38:59 MDT 2008",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib;
OCLC Article1st database",
note = "cryptographic confusion sequences; pseudo-random
sequence; random number generators; cryptographic
applications; random sequences; incompleteness theorem;
deterministic implementation; external analysis; RNG
comparison; chaos; Cebysev mixing; cellular automata;
linear congruential; linear feedback shift register;
nonlinear shift register; generalized feedback shift
register; additive types; isolator mechanisms; one-way
functions; combined sequences; random permutations;
primitive mod 2 polynomials; empirical state-trajectory
approach; RNG design analysis; GFSR",
URL = "http://fizz.sys.uea.ac.uk/~rs/ritter.html;
http://www.ciphersbyritter.com/ARTS/CRNG2ART.HTM;
http://www.informaworld.com/smpp/content~content=a741902748~db=all~order=page",
abstract = "A survey is given of pseudo-random sequence or random
number generators (RNGs) for cryptographic
applications, with extensive reference to the
literature, and seemingly unresolved issues discussed
throughout. An introduction to random sequences is
presented, with some speculative consequences suggested
by G{\"o}del's incompleteness theorem (G. Chaitin,
1987). Implications of a necessarily deterministic
implementation, techniques of external analysis, and
ways to complicate such analysis are discussed. A basis
for RNG comparison is suggested. Various RNGs are
described, including chaos, Cebysev mixing, cellular
automata, x/sup 2/ mod N, linear congruential, linear
feedback shift register, nonlinear shift register,
generalized feedback shift register and additive types.
Randomizer and isolator mechanisms, one-way functions,
the combined sequences from multiple RNGs, random
permutations, and methods for finding primitive mod 2
polynomials are also described. An empirical
state-trajectory approach to RNG design analysis is
given, and experimental results tabulated for several
cellular automata, x/sup 2/ mod N, GFSR, and additive
designs",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
keywords = "automata theory; cryptography; random number
generation; shift registers",
language = "English",
romanvolume = "XV",
}
@Article{Wheeler:1991:SIC,
author = "Daniel D. Wheeler and Robert A. J. Matthews",
title = "Supercomputer Investigations of a Chaotic Encryption
Algorithm",
journal = j-CRYPTOLOGIA,
volume = "15",
number = "2",
pages = "140--152",
month = apr,
year = "1991",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-119191865821",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:59 MDT 2008",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib;
OCLC Article1st database",
note = "chaotic encryption algorithm; nonlinear pseudo-random
number generator; chaos theory; cycling keys;
low-precision arithmetic; numerical investigation; Cray
Y-MP machine; cycling problem",
URL = "http://www.informaworld.com/smpp/content~content=a741902749~db=all~order=page",
abstract = "A nonlinear pseudo-random number generator based on
chaos theory was criticized for producing cycling keys
if used with low-precision arithmetic. The authors
present the results of a numerical investigation of the
algorithm's properties using a Cray Y-MP machine. This
suggests that the cycling problem can be combatted to
any desired degree. They conclude that the generator is
still of cryptographic interest",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
keywords = "chaos; cryptography; parallel programming; random
number generation; random processes",
language = "English",
romanvolume = "XV",
}
@Article{Burke:1991:LER,
author = "Colin Burke and Ralph Erskine",
title = "Letters to the {Editor}: Re: {Safford} Article",
journal = j-CRYPTOLOGIA,
volume = "15",
number = "2",
pages = "153--160",
month = apr,
year = "1991",
CODEN = "CRYPE6",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Sat Nov 21 12:35:16 MST 1998",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
note = "Reprinted in \cite[pp. 279--286]{Deavours:1998:SCH}.",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "XV",
}
@Article{Guy:1991:LER,
author = "Jacques B. M. Guy",
title = "Letter to the {Editor}: Re: {Voynich Manuscript}",
journal = j-CRYPTOLOGIA,
volume = "15",
number = "2",
pages = "161--166",
month = apr,
year = "1991",
CODEN = "CRYPE6",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Fri Mar 15 09:01:39 MST 2002",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib;
OCLC Article1st database",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "XV",
}
@Article{Kruh:1991:RTCb,
author = "Louis Kruh",
title = "Reviews and Things Cryptologic",
journal = j-CRYPTOLOGIA,
volume = "15",
number = "2",
pages = "167--176",
month = apr,
year = "1991",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-119191865830",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:38:59 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902750~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "XV",
}
@Article{Garon:1991:WES,
author = "Gilles Garon and Richard Outerbridge",
title = "{DES} Watch: An Examination of the Sufficiency of the
{Data Encryption Standard} for Financial Institution
Information Security in the 1990's",
journal = j-CRYPTOLOGIA,
volume = "15",
number = "3",
pages = "177--193",
month = jul,
year = "1991",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-119191865849",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:39:00 MDT 2008",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib;
OCLC Article1st database",
note = "data encryption standard; financial institution
information security; FIs; unmodified single-key DES;
financial systems; key management security;
double-length keys; financial systems",
URL = "http://www.informaworld.com/smpp/content~content=a741902752~db=all~order=page",
abstract = "DES is used almost universally by financial
institutions (FIs) around the world. For the
foreseeable future there are no alternatives to its
continued use. Within ten years (to 2001) unmodified
single-key DES will be breakable for a cost of about
\$3,500 per solution in under one day. Many financial
systems which currently rely on single-key DES are
therefore becoming vulnerable to attack. Despite the
impact of breaking DES, the misconception that an FI's
exposure is limited to the dollar values of particular
short-lived transactions may make users unwilling to
undertake urgent remedial measures. They may be
prepared to tolerate risks they perceive as limited and
unrealistic. This view ignores the danger that a breach
of key management security poses to the system as a
whole. Until a new encryption standard emerges, the
exposure and consequences can be avoided by the
adoption of double-length keys for DES. This is
technically and economically feasible. Double-length
keys and unique keys per transaction should be
implemented in financial systems as soon as possible",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
keywords = "cryptography; financial data processing; standards",
language = "English",
romanvolume = "XV",
}
@Article{Anderson:1991:TFC,
author = "Ross J. Anderson",
title = "Tree Functions and Cipher Systems",
journal = j-CRYPTOLOGIA,
volume = "15",
number = "3",
pages = "194--202",
month = jul,
year = "1991",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-119191865858",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:39:00 MDT 2008",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib;
OCLC Article1st database",
note = "encryption systems; plaintext bit; hash function;
ciphertext errors; error extension; tree function;
ciphertext attack; computable attack; connectivity;
DES; RSA key selection; algorithm design",
URL = "http://www.informaworld.com/smpp/content~content=a741902753~db=all~order=page",
abstract = "A number of encryption systems work by combining each
plaintext bit with a hash function of the last $n$
ciphertext bits. Such systems are self-synchronising in
that they recover from ciphertext errors with an error
extension of $n$. The author shows that if the hash
function is a tree function, then the system is
vulnerable to a chosen ciphertext attack and, under
certain circumstances, to a chosen plaintext attack;
secondly, that all hash functions are equivalent to
some tree function; thirdly, that whether or not this
gives a computable attack on a given algorithm depends
on the connectivity of a graph associated with the hash
function; and, fourthly, the implications for DES, for
RSA key selection, and for algorithm design in
general",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
keywords = "algorithm theory; cryptography; data integrity; file
organisation; trees (mathematics)",
language = "English",
romanvolume = "XV",
}
@Article{Desmedt:1991:CDN,
author = "Yvo G. Desmedt",
title = "The {``$A$''} cipher does not necessarily strengthen
security",
journal = j-CRYPTOLOGIA,
volume = "15",
number = "3",
pages = "203--206",
month = jul,
year = "1991",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-119191865867",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
MRclass = "94A60",
MRnumber = "92f:94013",
bibdate = "Mon Jun 30 15:39:00 MDT 2008",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib;
OCLC Article1st database",
note = "enciphering transformation; multiplication;
homomorphism; A cipher; cryptanalyst",
URL = "http://www.informaworld.com/smpp/content~content=a741902754~db=all~order=page",
abstract = "G. Georgiou (1989) proposed a method to strengthen
ciphers based on a combination of an enciphering
transformation and a multiplication. If the enciphering
transformation is a homomorphism and the multiplication
in the domain is used in the A cipher and the
multiplication in the range is known to the
cryptanalyst, his method does not strengthen the cipher
at all",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
keywords = "cryptography",
language = "English",
romanvolume = "XV",
}
@Article{Guy:1991:SPT,
author = "Jacques B. M. Guy",
title = "Statistical Properties of the Two Folios of the
{Voynich Manuscript}",
journal = j-CRYPTOLOGIA,
volume = "15",
number = "3",
pages = "207--218",
month = jul,
year = "1991",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-119191865876",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:39:00 MDT 2008",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib;
OCLC Article1st database",
URL = "http://www.informaworld.com/smpp/content~content=a741902755~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "XV",
xxtitle = "Statistical Properties of Two Folios of the {Voynich
Manuscript}",
}
@Article{Callimahos:1991:LWF,
author = "Lambros D. Callimahos",
title = "The Legendary {William F. Friedman}",
journal = j-CRYPTOLOGIA,
volume = "15",
number = "3",
pages = "219--236",
month = jul,
year = "1991",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-119191865885",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:39:00 MDT 2008",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib;
OCLC Article1st database",
URL = "http://www.informaworld.com/smpp/content~content=a741902756~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "XV",
}
@Article{Kruh:1991:SET,
author = "Louis Kruh and Paul Edden",
title = "Seizing the {ENIGMA}: Two Reviews of One Book",
journal = j-CRYPTOLOGIA,
volume = "15",
number = "3",
pages = "237--240",
month = jul,
year = "1991",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-119191865894",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:39:00 MDT 2008",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib;
OCLC Article1st database",
URL = "http://www.informaworld.com/smpp/content~content=a741902757~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "XV",
xxauthor = "Louis Kruh and Paul Edelen",
}
@Article{Kruh:1991:RTCc,
author = "Louis Kruh",
title = "Reviews and Things Cryptologic",
journal = j-CRYPTOLOGIA,
volume = "15",
number = "3",
pages = "241--246",
month = jul,
year = "1991",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-119191865902",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:39:00 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902758~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "XV",
}
@Article{Friedman:1991:IRC,
author = "William F. Friedman",
title = "Information Regarding Cryptographic Systems Submitted
for Use by the Military Service and Forms to be Used",
journal = j-CRYPTOLOGIA,
volume = "15",
number = "3",
pages = "247--257",
month = jul,
year = "1991",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-119191865911",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:39:00 MDT 2008",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib;
OCLC Article1st database",
URL = "http://www.informaworld.com/smpp/content~content=a741902759~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "XV",
}
@Article{Guy:1991:VIO,
author = "Jacques B. M. Guy",
title = "Vowel Identification: An Old (But Good) Algorithm",
journal = j-CRYPTOLOGIA,
volume = "15",
number = "3",
pages = "258--262",
month = jul,
year = "1991",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-119191865920",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:39:00 MDT 2008",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib;
OCLC Article1st database",
note = "vowel identification; accurate algorithm; plaintext;
simple substitution cipher; very fast algorithm; Soviet
researcher",
URL = "http://www.informaworld.com/smpp/content~content=a741902760~db=all~order=page",
abstract = "A very fast and accurate algorithm for identifying
vowels and consonants in plaintext or in a simple
substitution cipher, is presented. C. Foster (see
ibid., vol. 14, no. 4, p. 355--62, 1990), proposed an
algorithm to identify which letters of a simple
substitution cipher are vowels. A very fast algorithm
which does precisely that was discovered by a Soviet
researcher, B. V. Sukhotin (1962; 1973). The author
presents a version Sukhotin's algorithm in English",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
keywords = "cryptography; data analysis",
language = "English",
romanvolume = "XV",
}
@Article{Friedman:1991:BHS,
author = "William F. Friedman",
title = "A Brief History of the {Signal Intelligence Service}
by the {Military Service} and Forms to be Used",
journal = j-CRYPTOLOGIA,
volume = "15",
number = "3",
pages = "263--272",
month = jul,
year = "1991",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-119191865939",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:39:00 MDT 2008",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib;
OCLC Article1st database",
URL = "http://www.informaworld.com/smpp/content~content=a741902761~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "XV",
}
@Article{Kahn:1991:PHI,
author = "David Kahn",
title = "{Pearl Harbor} and the Inadequacy of Cryptanalysis",
journal = j-CRYPTOLOGIA,
volume = "15",
number = "4",
pages = "273--294",
month = oct,
year = "1991",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-119191865948",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:39:00 MDT 2008",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib;
OCLC Article1st database",
note = "Reprinted in \cite[pp. 35--56]{Deavours:1998:SCH}.",
URL = "http://www.informaworld.com/smpp/content~content=a741902763~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "XV",
}
@Article{Parker:1991:UMP,
author = "Frederick D. Parker",
title = "The Unsolved Messages of {Pearl Harbor}",
journal = j-CRYPTOLOGIA,
volume = "15",
number = "4",
pages = "295--313",
month = oct,
year = "1991",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-119191865957",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:39:00 MDT 2008",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib;
OCLC Article1st database",
note = "Reprinted in \cite[pp. 57--75]{Deavours:1998:SCH}.",
URL = "http://www.informaworld.com/smpp/content~content=a741902764~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "XV",
}
@Article{Anderson:1991:ECI,
author = "Roland Anderson",
title = "Extending the Concept of Interval",
journal = j-CRYPTOLOGIA,
volume = "15",
number = "4",
pages = "314--324",
month = oct,
year = "1991",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-119191865966",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:39:00 MDT 2008",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib;
OCLC Article1st database",
note = "interval concept; cryptography; identity information",
URL = "http://www.informaworld.com/smpp/content~content=a741902765~db=all~order=page",
abstract = "The relative variation in length found among the
intervals between occurrences of characters in written
text provides extremely valuable clues as to the
identity of those characters. It is possible to obtain
still more identity information by extending the
definition of `interval' so that intervals of various
kinds can be distinguished. In addition, it is possible
to make use of `complex' or `multi-dimensional'
intervals by giving simultaneous consideration to a
number of adjacent `simple' intervals",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
keywords = "cryptography",
language = "English",
romanvolume = "XV",
}
@Article{Kruh:1991:RTCd,
author = "Louis Kruh",
title = "Reviews and Things Cryptologic",
journal = j-CRYPTOLOGIA,
volume = "15",
number = "4",
pages = "325--334",
month = oct,
year = "1991",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-119191865975",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:39:00 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902766~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "XV",
}
@Article{Anonymous:1991:ASU,
author = "Anonymous",
title = "From the Archives: Security of {Ultra Dexter} and
{Rabid Intelligence War Department}",
journal = j-CRYPTOLOGIA,
volume = "15",
number = "4",
pages = "341--354",
month = oct,
year = "1991",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-119191865984",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:39:00 MDT 2008",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib;
OCLC Article1st database",
URL = "http://www.informaworld.com/smpp/content~content=a741902767~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "XV",
}
@Article{Wheeler:1991:PMN,
author = "Daniel D. Wheeler",
title = "Problems with {Mitchell}'s Nonlinear Key Generators",
journal = j-CRYPTOLOGIA,
volume = "15",
number = "4",
pages = "355--363",
month = oct,
year = "1991",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-119191865993",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:39:00 MDT 2008",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib;
OCLC Article1st database",
note = "pseudo random numbers; successive differences;
nonlinear key generators; probable-word attack",
URL = "http://www.informaworld.com/smpp/content~content=a741902768~db=all~order=page",
abstract = "The key sequences from Mitchell's (ibid., vol. 14, p.
350--354, 1990) nonlinear key generator show clear
patterns when successive differences are examined.
These are sufficient to break the system with a
probable-word attack",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
keywords = "cryptography; random number generation",
language = "English",
romanvolume = "XV",
}
@Article{Kruh:1992:RTCa,
author = "Louis Kruh",
title = "Reviews and Things Cryptologic",
journal = j-CRYPTOLOGIA,
volume = "16",
number = "1",
pages = "1--22",
month = jan,
year = "1992",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-119291866739",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:39:01 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib",
URL = "http://www.informaworld.com/smpp/content~content=a741902821~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "XVI",
}
@Article{Robinson:1992:FRC,
author = "Bill Robinson",
title = "The Fall and Rise of Cryptanalysis in {Canada}",
journal = j-CRYPTOLOGIA,
volume = "16",
number = "1",
pages = "23--38",
month = jan,
year = "1992",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-119291866748",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:39:01 MDT 2008",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib;
OCLC Article1st database",
note = "Reprinted in \cite[pp. 77--92]{Deavours:1998:SCH}.",
URL = "http://www.informaworld.com/smpp/content~content=a741902822~db=all~order=page",
abstract = "In the late 1970s, Canada's Communications Security
Establishment (CSE) was an organization in decline. By
1979 only one person was still doing real
cryptanalysis. Earlier in 1980, however, CSE had sent
T. Johnston to NSA to investigate what it would take to
re-enter the field. This effort culminated in the
purchase of a Cray X-MP supercomputer, installed in
1985, and the hiring of a new staff of cryptanalysts to
make use of it. Only with these developments did CSE
enter the modern age of cryptanalysis",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
keywords = "cryptography; societies",
language = "English",
romanvolume = "XVI",
subject = "Communications Security Establishment; cryptanalysis;
Cray X-MP; supercomputer",
}
@Article{Erskine:1992:GNG,
author = "Ralph Erskine",
title = "The {German Naval} Grid in {World War II}",
journal = j-CRYPTOLOGIA,
volume = "16",
number = "1",
pages = "39--51",
month = jan,
year = "1992",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-119291866757",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:39:01 MDT 2008",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib;
OCLC Article1st database",
URL = "http://www.informaworld.com/smpp/content~content=a741902823~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "XVI",
}
@Article{Carroll:1992:CCE,
author = "John M. Carroll and Jeff Verhagen and Perry T. Wong",
title = "Chaos in Cryptography: The Escape from the Strange
Attractor",
journal = j-CRYPTOLOGIA,
volume = "16",
number = "1",
pages = "52--72",
month = jan,
year = "1992",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-119291866766",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
MRclass = "94A60 (58F13)",
MRnumber = "1 145 809",
bibdate = "Mon Jun 30 15:39:01 MDT 2008",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib;
OCLC Article1st database",
note = "cryptography; random characteristics; cipher system;
pseudo-random number generators; random generators;
Lorenz attractor; chaotic nature; strange attractor;
key management; authentication protocols",
URL = "http://www.informaworld.com/smpp/content~content=a741902824~db=all~order=page",
ZMnumber = "746.94012",
abstract = "Modern cryptography has a voracious appetite for
reproducible sequences of large numbers that possess
random characteristics. Because a cipher system is
vulnerable to attack if cryptanalysts can successfully
guess the nature of its underlying pseudo-random number
generators, it is helpful for cryptographers to have a
large repertoire of them. Chaos theory provides many
formulations that can be used as random generators. The
paper describes one of these, the Lorenz attractor. The
chaotic nature of the Lorenz system of equations makes
it a good candidate for pseudo-random number
generation. However, to ensure that its sequences are
not serially autocorrelated, they must be modified so
that the particle can escape from the field of the
strange attractor. The modified system produces
extremely long sequences with good random properties.
The generating algorithm is fast and efficient.
Significantly, several components are needed to specify
the starting point, which increases resistance to
cryptanalysis and admits a number of key management and
authentication protocols",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
keywords = "chaos; cryptography; random number generation; random
processes",
language = "English",
romanvolume = "XVI",
}
@Article{Gaj:1992:PCM,
author = "Krzysztof Gaj",
title = "{Polish} Cipher Machine --- {LUCIDA}",
journal = j-CRYPTOLOGIA,
volume = "16",
number = "1",
pages = "73--80",
month = jan,
year = "1992",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-119291866775",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:39:01 MDT 2008",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib;
OCLC Article1st database",
URL = "http://www.informaworld.com/smpp/content~content=a741902825~db=all~order=page",
abstract = "The Polish cipher machine, constructed early in the
1930s and used during World War II is described. Its
origin and application are presented. Details of
construction, results, and implications of its
cryptanalysis, made by Polish cipher experts in 1941,
are described",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
keywords = "cryptography; history; military systems",
language = "English",
romanvolume = "XVI",
subject = "military communications; Lucida; Polish cipher
machine; cryptanalysis",
}
@Article{Kruh:1992:BPH,
author = "Louis Kruh",
title = "{``Betrayal at Pearl Harbor''}: Book Review",
journal = j-CRYPTOLOGIA,
volume = "16",
number = "1",
pages = "81--85",
month = jan,
year = "1992",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-119291866784",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:39:01 MDT 2008",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib;
OCLC Article1st database",
note = "See \cite{Rusbridger:1991:BPH}.",
URL = "http://www.informaworld.com/smpp/content~content=a741902826~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "XVI",
}
@Article{Kruh:1992:SCD,
author = "Louis Kruh",
title = "Sliding Code Device of Unknown Origin",
journal = j-CRYPTOLOGIA,
volume = "16",
number = "1",
pages = "86--88",
month = jan,
year = "1992",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-119291866793",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:39:01 MDT 2008",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib;
OCLC Article1st database",
URL = "http://www.informaworld.com/smpp/content~content=a741902827~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "XVI",
}
@Article{Al-Kadit:1992:OCA,
author = "Ibrahim A. Al-Kadit",
title = "Origins of cryptology: {The} {Arab} contributions",
journal = j-CRYPTOLOGIA,
volume = "16",
number = "2",
pages = "97--126",
month = apr,
year = "1992",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-119291866801",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
MRclass = "01A30 (94-03)",
MRnumber = "93b:01010",
bibdate = "Mon Jun 30 15:39:02 MDT 2008",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib;
OCLC Article1st database",
note = "Reprinted in \cite[pp. 93--122]{Deavours:1998:SCH}.",
URL = "http://www.informaworld.com/smpp/content~content=a741902830~db=all~order=page",
ZMnumber = "756.01011",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "XVI",
xxauthor = "Ibrahim A. Al-Kadi",
}
@Article{Rabson:1992:AWB,
author = "John Rabson",
title = "All Are Well at {Boldon}: a Mid-{Victorian} Code
System",
journal = j-CRYPTOLOGIA,
volume = "16",
number = "2",
pages = "127--135",
month = apr,
year = "1992",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-119291866810",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:39:02 MDT 2008",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib;
OCLC Article1st database",
URL = "http://www.informaworld.com/smpp/content~content=a741902831~db=all~order=page",
ZMnumber = "756.01028",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "XVI",
}
@Article{McLaughlin:1992:YAM,
author = "Robert McLaughlin",
title = "Yet Another Machine to Break {DES}",
journal = j-CRYPTOLOGIA,
volume = "16",
number = "2",
pages = "136--144",
month = apr,
year = "1992",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-119291866829",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:39:02 MDT 2008",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib;
OCLC Article1st database",
note = "data encryption standard; DES; current high-speed
encryption chips; hardware fuzzy comparers; breaking
process",
URL = "http://www.informaworld.com/smpp/content~content=a741902832~db=all~order=page",
abstract = "The data encryption standard (DES) has been the
subject of multiple attempts at breaking. As of this
date (April 1992), no one has announced a method that
will break DES with certainty. The author does not
consider a method but develops another machine. This
machine makes use of current high-speed encryption
chips in combination with hardware fuzzy comparers to
automate the breaking process",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
keywords = "cryptography; fuzzy logic; microprocessor chips;
standards",
language = "English",
romanvolume = "XVI",
}
@Article{Kruh:1992:ANC,
author = "Louis Kruh",
title = "{Army--Navy} Collaboration for Cryptanalysis of Enemy
Systems",
journal = j-CRYPTOLOGIA,
volume = "16",
number = "2",
pages = "145--164",
month = apr,
year = "1992",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-119291866838",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:39:02 MDT 2008",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib;
OCLC Article1st database",
URL = "http://www.informaworld.com/smpp/content~content=a741902833~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "XVI",
}
@Article{Sassoon:1992:ASA,
author = "George T. Sassoon",
title = "The Application of {Sukhotin}'s Algorithm to Certain
Non-{English} Languages",
journal = j-CRYPTOLOGIA,
volume = "16",
number = "2",
pages = "165--173",
month = apr,
year = "1992",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-119291866847",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:39:02 MDT 2008",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib;
OCLC Article1st database",
note = "Sukhotin algorithm; vowel-finding algorithm;
simple-substitution ciphertext; foreign languages;
computer program VOWEL1; compiled BASIC; English;
Georgian; Croatian; Scottish Gaelic; Hungarian; Hebrew
languages",
URL = "http://www.informaworld.com/smpp/content~content=a741902834~db=all~order=page",
abstract = "J. B. M. Guy (see ibid., vol. 15, no. 3, p. 258--262,
1991), described Sukhotin's algorithm for identifying
the vowels in a simple-substitution ciphertext and
showed how it can be implemented. The author decided to
try it out on certain foreign languages. This was done
using a computer program VOWEL1 in compiled BASIC,
which was thoroughly tested against pencil-and-paper
methods on short plaintexts. The method was applied to:
English, Georgian, Croatian, Scottish Gaelic, Hungarian
and Hebrew languages",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
keywords = "linguistics; word processing",
language = "English",
romanvolume = "XVI",
}
@Article{Alvarez:1992:PDC,
author = "David Alvarez",
title = "A {Papal} Diplomatic Code",
journal = j-CRYPTOLOGIA,
volume = "16",
number = "2",
pages = "174--176",
month = apr,
year = "1992",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-119291866856",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:39:02 MDT 2008",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib;
OCLC Article1st database",
URL = "http://www.informaworld.com/smpp/content~content=a741902835~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "XVI",
}
@Article{Webb:1992:PKC,
author = "William A. Webb",
title = "A Public-Key Cryptosystem Based on Complementing
Sets",
journal = j-CRYPTOLOGIA,
volume = "16",
number = "2",
pages = "177--181",
month = apr,
year = "1992",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-119291866865",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
MRclass = "94A60",
MRnumber = "93a:94025",
bibdate = "Mon Jun 30 15:39:02 MDT 2008",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib;
OCLC Article1st database",
note = "public key cryptosystem; complementing sets;
integers",
URL = "http://www.informaworld.com/smpp/content~content=a741902836~db=all~order=page",
abstract = "A public key cryptosystem is constructed, based on the
idea of complementing sets A/sub 1/, A/sub 2/,
\ldots{}, A/sub k/ of integers. Such sets have the
property that all sums a/sub 1/+a/sub 2/+ \cdots{} +
a/sub k/ where a/sub i/ in A/sub i/, are distinct",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
keywords = "cryptography; set theory",
language = "English",
romanvolume = "XVI",
}
@Article{Kruh:1992:RTCb,
author = "Louis Kruh",
title = "Reviews and Things Cryptologic",
journal = j-CRYPTOLOGIA,
volume = "16",
number = "2",
pages = "182--190",
month = apr,
year = "1992",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-119291866874",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:39:02 MDT 2008",
bibsource = "http://www.dean.usma.edu/math/pubs/cryptologia/;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib;
OCLC Article1st database",
URL = "http://www.informaworld.com/smpp/content~content=a741902837~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "XVI",
}
@Article{Wayner:1992:MF,
author = "Peter Wayner",
title = "Mimic Functions",
journal = j-CRYPTOLOGIA,
volume = "16",
number = "3",
pages = "193--214",
month = jul,
year = "1992",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-119291866883",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
MRclass = "94A60",
MRnumber = "1 170 667",
bibdate = "Mon Jun 30 15:39:02 MDT 2008",
bibsource = "ftp://ftp.math.utah.edu/pub/mirrors/ftp.ira.uka.de/bibliography/Graphics/information.hiding.watermarking.bib;
http://www.cl.cam.ac.uk/~fapp2/steganography/bibliography;
http://www.math.utah.edu/pub/tex/bib/cryptologia.bib;
OCLC Article1st database",
note = "data compression; encryption; mimic function; Huffman
coding; context-free grammars",
URL = "http://www.cl.cam.ac.uk/~fapp2/steganography/bibliography/1029.html;
http://www.informaworld.com/smpp/content~content=a741902839~db=all~order=page",
ZMnumber = "752.68034",
abstract = "A mimic function changes a file A so it assumes the
statistical properties of another file B. That is, if
p(t,A) is the probability of some substring t occurring
in A, then a mimic function f, recodes A so that
p(t,f(A)) approximates p(t,B) for all strings t of
length less than some n. This paper describes the
algorithm for computing mimic functions and compares
the algorithm with its functional inverse, Huffman
coding. The paper also provides a description of more
robust and more general mimic functions which can be
defined using context-free grammars and van Wijngaarden
grammars (1974)",
abstract-2 = "The author shows how the inverse of Huffman coding can
be used to endow one file with the statistical
characteristics of another. Examples are given of
randomly generated text with the statistical properties
of English, for third order through sixth order
statistics and for a context free grammar.",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
keywords = "context-free grammars; cryptography; data compression;
encoding",
language = "English",
romanvolume = "XVI",
}
@Article{King:1992:IPR,
author = "John C. King and Dennis R. Bahler",
title = "An Implementation of Probabilistic Relaxation in the
Cryptanalysis of Simple Substitution Ciphers",
journal = j-CRYPTOLOGIA,
volume = "16",
number = "3",
pages = "215--225",
month = jul,
year = "1992",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-119291866892",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:39:02 MDT 2008",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib;
OCLC Article1st database",
note = "trigram statistics generation; probabilistic
relaxation; cryptanalysis; Pascal; adjustment formula;
simple substitution ciphers; homophonic ciphers",
URL = "http://www.informaworld.com/smpp/content~content=a741902840~db=all~order=page",
abstract = "Relaxation algorithms have been used successfully in
the automated cryptanalysis of simple substitution
ciphers. This paper describes a Pascal implementation
of relaxation using an adjustment formula (C. Shannon,
1951). The formula is used to generate trigram
statistics suitable for the solution of simple
substitution ciphers without word divisions. Problems
encountered when applying relaxation to homophonic
ciphers are identified",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
keywords = "cryptography; Pascal listings",
language = "English",
romanvolume = "XVI",
}
@Article{Anderson:1992:CRN,
author = "Ross Anderson",
title = "Chaos and Random Numbers",
journal = j-CRYPTOLOGIA,
volume = "16",
number = "3",
pages = "226--226",
month = jul,
year = "1992",
CODEN = "CRYPE6",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Fri Mar 15 09:01:38 MST 2002",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib;
OCLC Article1st database",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "XVI",
}
@Article{Shirriff:1992:DVC,
author = "Ken Shirriff and Curt Welch and Andrew Kinsman",
title = "Decoding a {VCR} Controller Code",
journal = j-CRYPTOLOGIA,
volume = "16",
number = "3",
pages = "227--234",
month = jul,
year = "1992",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-119291866900",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:39:02 MDT 2008",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib;
OCLC Article1st database",
note = "video cassette recorder programming; encryption;
encoding; VCR Plus+; remote control; decoding",
URL = "http://www.informaworld.com/smpp/content~content=a741902841~db=all~order=page;
http://www.righto.com/papers/vcr.html",
abstract = "The VCR Plus+ is a remote control for programming
video cassette recorders. It uses an encrypted 1 to 8
digit number that encodes the channel, start time,
length, and day of the month of the television show to
be recorded. This paper describes a procedure for
decoding the 1 to 6 digit codes",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
keywords = "codes; cryptography; encoding",
language = "English",
romanvolume = "XVI",
}
@Article{Kruh:1992:RTCc,
author = "Louis Kruh",
title = "Reviews and Things Cryptologic",
journal = j-CRYPTOLOGIA,
volume = "16",
number = "3",
pages = "235--249",
month = jul,
year = "1992",
CODEN = "CRYPE6",
DOI = "https://doi.org/10.1080/0161-119291866919",
ISSN = "0161-1194 (print), 1558-1586 (electronic)",
ISSN-L = "0161-1194",
bibdate = "Mon Jun 30 15:39:02 MDT 2008",
bibsource = "http://www.math.utah.edu/pub/tex/bib/cryptologia.bib;
OCLC Article1st database",
URL = "http://www.informaworld.com/smpp/content~content=a741902842~db=all~order=page",
acknowledgement = ack-nhfb,
fjournal = "Cryptologia",
journal-URL = "http://www.tandfonline.com/loi/ucry20",
romanvolume = "XVI",
}
@Article{Mitchell:1992:RCT,
author = "Douglas W. Mitchell",
title = "{``Rubik's Cube''} As a Transposition Device",
journ