Works matching DE "ENIGMA cipher system"
1
- Journal of Integrative Neuroscience, 2017, v. 16, p. S3, doi. 10.3233/JIN-170061
- Accorsi, P. A.;
- Mondo, E.;
- Cocchi, M.
- Article
3
- reFRESH Magazine, 2008, n. 52, p. 36
- Article
5
- Quantum Information Processing, 2014, v. 13, n. 10, p. 2277, doi. 10.1007/s11128-014-0771-5
- Article
7
- Mathematics Magazine, 2007, v. 80, n. 4, p. 247, doi. 10.1080/0025570X.2007.11953492
- Article
8
- English Historical Review, 2004, v. 119, n. 483, p. 922, doi. 10.1093/ehr/119.483.922
- Article
10
- Soft Computing - A Fusion of Foundations, Methodologies & Applications, 2018, v. 22, n. 23, p. 7961, doi. 10.1007/s00500-017-2743-z
- Liu, Weiran;
- Liu, Jianwei;
- Wu, Qianhong;
- Qin, Bo;
- Naccache, David;
- Ferradi, Houda
- Article
12
- STEAM Journal, 2016, v. 2, n. 2, p. 1, doi. 10.5642/steam.20160202.31
- Article
13
- Journal of Case Research, 2018, v. 9, n. 2, p. 1
- Article
14
- Gaceta de la Real Sociedad Matemática Española, 2022, v. 25, n. 1, p. 84
- Article
15
- ISSA Journal, 2016, v. 14, n. 2, p. 5
- Article
16
- Journal of Education, 1881, v. 13, n. 8, p. 135
- M. M. S.;
- Southwell, Robert
- Article
17
- International Journal of Impotence Research, 2003, v. 15, p. S93, doi. 10.1038/sj.ijir.3901082
- Article
18
- Journal of Intelligence History, 2014, v. 13, n. 2, p. 176, doi. 10.1080/16161262.2014.896113
- Article
19
- Computer Measurement & Control, 2018, v. 26, n. 2, p. 142, doi. 10.16526/j.cnki.11-4762/tp.2018.02.035
- Article
21
- Intelligence & National Security, 2018, v. 33, n. 1, p. 139, doi. 10.1080/02684527.2017.1303222
- Article
22
- Intelligence & National Security, 2009, v. 24, n. 6, p. 865, doi. 10.1080/02684520903320477
- Article
23
- Intelligence & National Security, 2006, v. 21, n. 1, p. 129, doi. 10.1080/02684520600568444
- Article
25
- European Physical Journal B: Condensed Matter, 2015, v. 88, n. 6, p. 1, doi. 10.1140/epjb/e2015-60101-y
- Zhang, Jianlei;
- Zhang, Chunyan
- Article
26
- International Journal of Damage Mechanics, 2018, v. 27, n. 2, p. 218, doi. 10.1177/1056789516674765
- Article
28
- Cryptologia, 2019, v. 43, n. 4, p. 267, doi. 10.1080/01611194.2018.1551253
- Lasry, George;
- Kopal, Nils;
- Wacker, Arno
- Article
29
- Cryptologia, 2018, v. 42, n. 5, p. 445, doi. 10.1080/01611194.2018.1435216
- Article
31
- Cryptologia, 2018, v. 42, n. 3, p. 222, doi. 10.1080/01611194.2017.1362066
- Article
32
- Cryptologia, 2018, v. 42, n. 2, p. 106, doi. 10.1080/01611194.2016.1257522
- Vázquez, Manuel;
- Jiménez–Seral, Paz
- Article
33
- Cryptologia, 2017, v. 41, n. 5, p. 395, doi. 10.1080/01611194.2016.1238423
- Ostwald, Olaf;
- Weierud, Frode
- Article
34
- Cryptologia, 2017, v. 41, n. 4, p. 295, doi. 10.1080/01611194.2016.1219786
- Article
35
- Cryptologia, 2016, v. 40, n. 5, p. 428, doi. 10.1080/01611194.2015.1087073
- Article
36
- Cryptologia, 2016, v. 40, n. 4, p. 327, doi. 10.1080/01611194.2015.1062318
- Article
37
- Cryptologia, 2016, v. 40, n. 3, p. 215, doi. 10.1080/01611194.2015.1055387
- Article
38
- Cryptologia, 2016, v. 40, n. 1, p. 92, doi. 10.1080/01611194.2015.1028685
- Article
39
- Cryptologia, 2016, v. 40, n. 2, p. 177, doi. 10.1080/01611194.2015.1028680
- Article
40
- Cryptologia, 2016, v. 40, n. 1, p. 70, doi. 10.1080/01611194.2015.1028682
- Ostwald, Olaf;
- Weierud, Frode
- Article
41
- Cryptologia, 2015, v. 39, n. 1, p. 25, doi. 10.1080/01611194.2014.915263
- Article
42
- Cryptologia, 2014, v. 38, n. 3, p. 248, doi. 10.1080/01611194.2014.891398
- List, David;
- Gallehawk, John
- Article
43
- Cryptologia, 2014, v. 38, n. 2, p. 116, doi. 10.1080/01611194.2013.797051
- Chang, Kelly;
- Low, Richard M.;
- Stamp, Mark
- Article
44
- Cryptologia, 2013, v. 37, n. 3, p. 233, doi. 10.1080/01611194.2013.797048
- Soler Fuensanta, José Ramón;
- López-Brea Espiau, Francisco Javier;
- Navarro Bonilla, Diego
- Article
46
- Cryptologia, 2011, v. 35, n. 3, p. 277, doi. 10.1080/01611194.2011.595623
- Article
47
- Cryptologia, 2011, v. 35, n. 3, p. 247, doi. 10.1080/01611194.2011.559790
- Article
48
- Cryptologia, 2011, v. 35, n. 1, p. 16, doi. 10.1080/01611194.2010.533256
- Ertel, Wolfgang;
- Jans, Lucia;
- Herzhauser, Walter;
- Fessler, Joachim
- Article
49
- Cryptologia, 2010, v. 34, n. 4, p. 359, doi. 10.1080/01611194.2010.485452
- Article
50
- Cryptologia, 2010, v. 34, n. 4, p. 301, doi. 10.1080/01611194.2010.485414
- Fuensanta, Jose Ramon Soler;
- Espiau, Francisco Javier Lopez-Brea;
- Weierud, Frode
- Article