Abstract
The surprising discovery that information can be passed both covertly and legally between bridge partners has added a new dimension to the theory of this popular game. In this paper some of the methods are sketched and their cryptologic foundation is described.

This publication has 0 references indexed in Scilit: