|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 22 occurrences of 16 keywords
|
|
|
Results
Found 28 publication records. Showing 28 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
42 | Kris Gaj, Arkadiusz Orlowski |
Facts and Myths of Enigma: Breaking Stereotypes. |
EUROCRYPT |
2003 |
DBLP DOI BibTeX RDF |
Enigma, cipher machine, rotor, cryptanalytical bombe, code-breaking |
35 | Anthony E. Sale |
The Rebuilding of Colossus at Bletchley Park. |
IEEE Ann. Hist. Comput. |
2005 |
DBLP DOI BibTeX RDF |
Bletchley Park, Lorenz SZ42, Heath Robinson, paper tape, electric typewriter, vacuum tubes, thyratrons, WRNS, Post Office Research Labs, Tommy Flowers, Allen Coombs, Arnold Lynch, Super Robinson, The Duke of Kent, delta, Colossus, code-breaking |
26 | Frederick Jelinek |
Code Breaking for Automatic Speech Recognition. |
TSD |
2009 |
DBLP DOI BibTeX RDF |
|
25 | Simon H. Lavington |
In the Footsteps of Colossus: A Description of Oedipus. |
IEEE Ann. Hist. Comput. |
2006 |
DBLP DOI BibTeX RDF |
Digital storage, GCHQ, Bletchley Park, Oedipus, rapid analytical machine, Elliott Brothers (London) Ltd., Ferranti Ltd, associative memory, Colossus, code-breaking |
25 | Girish B. Ratanpal, Ronald D. Williams, Travis N. Blalock |
An On-Chip Signal Suppression Countermeasure to Power Analysis Attacks. |
IEEE Trans. Dependable Secur. Comput. |
2004 |
DBLP DOI BibTeX RDF |
VLSI, smartcards, DES, security and protection, Power analysis attacks, code breaking |
25 | Frank Rubin |
Decrypting a Stream Cipher Based on J-K Flop-Flops. |
IEEE Trans. Computers |
1979 |
DBLP DOI BibTeX RDF |
J?K flip-flop, linear shift register, cryptography, stream cipher, Boolean equations, code breaking |
21 | John A. N. Lee, Colin B. Burke, Deborah Anderson |
The US Bombes, NCR, Joseph Desch, and 600 WAVES: The First Reunion of the US Naval Computing Machine Laboratory. |
IEEE Ann. Hist. Comput. |
2000 |
DBLP DOI BibTeX RDF |
|
16 | Chris Christensen |
Review of Alastair Denniston: Code-Breaking from Room 40 to Berkeley Street and the Birth of GCHQ by Joel Greenberg. |
Cryptologia |
2019 |
DBLP DOI BibTeX RDF |
|
16 | Chris Christensen |
Review of Code Breaking in the Pacific by Peter Donovan and John Mack. |
Cryptologia |
2018 |
DBLP DOI BibTeX RDF |
|
16 | Chris Christensen |
Review of Silence Means Security: Secrets of a WWII Code-Breaking WAC by B. Nicodemus. |
Cryptologia |
2017 |
DBLP DOI BibTeX RDF |
|
16 | Gary Anthes |
French team invents faster code-breaking algorithm. |
Commun. ACM |
2014 |
DBLP DOI BibTeX RDF |
|
16 | Peter Donovan, John Mack |
Code Breaking in the Pacific |
|
2014 |
DOI RDF |
|
16 | Chris Christensen |
Review of Secret Days: Code-Breaking in Bletchley Park by Asa Briggs. |
Cryptologia |
2012 |
DBLP DOI BibTeX RDF |
|
16 | Chris Christensen |
Review of Modern Cryptanalysis: Techniques for Advanced Code Breaking by Christopher Swenson. |
Cryptologia |
2009 |
DBLP DOI BibTeX RDF |
|
16 | Christopher Swenson |
Modern cryptanalysis - techniques for advanced code breaking. |
|
2008 |
RDF |
|
16 | Jocelyn Fiorina |
Scrambling Code Breaking the Trade-Off Between Repetition Factor and Frame Length in Time-Hopping Impulse Radio Ultra Wide Band. |
VTC Fall |
2006 |
DBLP DOI BibTeX RDF |
|
16 | Sandeep S. Kumar, Christof Paar, Jan Pelzl, Gerd Pfeiffer, Manfred Schimmler |
COPACOBANA A Cost-Optimized Special-Purpose Hardware for Code-Breaking. |
FCCM |
2006 |
DBLP DOI BibTeX RDF |
|
16 | Anthony E. Sale |
Colossus and the German Lorenz Cipher - Code Breaking in WW II. |
EUROCRYPT |
2000 |
DBLP BibTeX RDF |
|
16 | Beryl Plimmer |
Machines invented for WW II code breaking. |
ACM SIGCSE Bull. |
1998 |
DBLP DOI BibTeX RDF |
|
16 | Jean-Jacques Quisquater, Yvo Desmedt |
Chinese Lotto as an Exhaustive Code-Breaking Machine. |
Computer |
1991 |
DBLP DOI BibTeX RDF |
|
13 | Daniel A. Connors, Wen-mei W. Hwu |
Compiler-Directed Dynamic Computation Reuse: Rationale and Initial Results. |
MICRO |
1999 |
DBLP DOI BibTeX RDF |
|
12 | Tim Güneysu, Timo Kasper, Martin Novotný, Christof Paar, Andy Rupp |
Cryptanalysis with COPACOBANA. |
IEEE Trans. Computers |
2008 |
DBLP DOI BibTeX RDF |
|
12 | Onur Aciiçmez, Jean-Pierre Seifert, Çetin Kaya Koç |
Micro-Architectural Cryptanalysis. |
IEEE Secur. Priv. |
2007 |
DBLP DOI BibTeX RDF |
|
12 | Solomon W. Golomb |
On the Cryptanalysis of Nonlinear Sequences. |
IMACC |
1999 |
DBLP DOI BibTeX RDF |
|
10 | Stefan Zickler, Manuela M. Veloso |
Playing Creative Soccer: Randomized Behavioral Kinodynamic Planning of Robot Tactics. |
RoboCup |
2008 |
DBLP DOI BibTeX RDF |
|
10 | A. K. M. Harun-Ar-Rashid |
Independent Channel Multi Method Multi-Factor Authentication (MMM-FA) model for B2P remote Commerce. |
EDOC Workshops |
2006 |
DBLP DOI BibTeX RDF |
|
10 | B. Jack Copeland |
Colossus: Its Origins and Originators. |
IEEE Ann. Hist. Comput. |
2004 |
DBLP DOI BibTeX RDF |
Newman, Tutte, Bletchley Park, Lorenz Sz40/42, Tunny, Heath Robinson, First Electronic Computer, Turingery, Statistical Method, Turing, Differencing, Flowers, Colossus |
10 | Kenji Koyama |
Direct Demonstration of the Power to Break Public-Key Cryptosystems. |
AUSCRYPT |
1990 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #28 of 28 (100 per page; Change: )
|
|