Cryptologia

Papers
(The median citation count of Cryptologia is 0. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-02-01 to 2025-02-01.)
ArticleCitations
The ciphers of the Republic of Venice an overview6
Review of Crypto Wars—The Fight for Privacy in the Digital Age: A Political History of Digital Encryption4
Review of The Secret Life of an American Codebreaker: Codebreaker Girls by Jan SlimmingSlimming, Jan. The Secret Life of an American Codebreaker: Codebrea4
Rudyard Kipling’s unsolved cryptogram3
Fault-assisted side-channel analysis of HMAC-Streebog3
The new golden age of decipherment3
Review of The Rose Code by Kate Quinn3
A treatise on the Rilke cryptogram3
Shadow IT in higher education: survey and case study for cybersecurity2
Review of Eavesdropping on the Emperor: Interrogators and Codebreakers in Britain’s War with Japan by Peter Kornicki2
Review of The Enigma Affair by Charlie Lovett2
Sources and methods: Searching for cryptologic records in the findings of post-World War II allied technical surveys and commissions2
Review of No More Secrets: My Part in Codebreaking at Bletchley Park and the Pentagon by Betty WebbWebb, Betty. No More Secrets: My Part in codebreaking a2
Resource guide for teaching post-quantum cryptography1
Review of The Woman All Spies Fear by Amy Butler Greenfield and Code Breaker, Spy Hunter by Laurie Wallmark, Illustrated by Brooke Smart1
Review of codebreaker by Marc McMenamin1
Sources and methods for cryptologic history: researching individuals (and the biography boom)1
Review of Codebreaking: A Practical Guide by Elonka Dunin and Klaus Schmeh1
Review of The U.S. Navy's On-the-Roof Gang, Volume Two, War in the Pacific by Matt Zullo1
Review of The Real Special Relationship by Michael Smith1
Cryptanalysis of RSA with small difference of primes and two decryption exponents: Jochemsz and May approach1
Review of The linguistics of the Voynich manuscript by Claire Bowern and Luke Lindemann1
Statistical tests suites analysis methods. Cryptographic recommendations1
Classifying World War II era ciphers with machine learning1
FCSR connection integers: efficient generation, testing and counting1
Modern cryptanalysis of the Truppenschlüssel1
Review of Radio War: The Secret Espionage War of the Radio Security Service 1938–1946 by David Abrutat1
Deciphering Mary Stuart’s lost letters from 1578-15841
The first Czechoslovak cipher machine1
The Codebreakers war: David Kahn, Macmillan, the government, and the making of a cryptologic history masterpiece1
An artificial neural network approach to finding the key length of the Vigenère cipher1
Review of the expanded edition of Codebreaking: A Practical Guide by Elonka Dunin and Klaus SchmehDunin, Elonka and Klaus, Schmeh. Codebreaking: A Practic1
Review of The Nazi Spy Ring in America by Rhodri Jeffreys-Jones1
Review of Codebreaker Girls: A Secret Life at Bletchley Park by Jan Slimming1
An improved cryptanalysis of multi-prime RSA with specific forms of decryption exponent1
Review of Enigma Traitors by Dermot Turing1
Covert 19th century political intrigues of Tenerife nobility revealed by cryptanalyzing an encrypted letter0
The Immortal David Kahn0
Review of The Rohonc Code: Tracing a Historical Riddle by Benedek Láng0
Decentralized universally verifiable stake voting system with perfect privacy0
Can musical encryption be both? A survey of music-based ciphers0
A statistical cryptanalysis of the Beale ciphers0
Review of The Bletchley Park Codebreakers in their own words by Joel Greenberg0
Enigma, the XYZ period (1939–1940)0
Review of the second edition of Craig Bauer’s “ Secret History: The Story of Cryptology, Second Edition0
Analysis of a late 19th century french cipher created by Major Josse0
Review of From the Ground Up by Betsy Rohaly SmootSmoot, Betsy Rohaly. 2023. From the Ground Up: American Cryptology during World War I . 0
Review of USN & USMC WW II Cryptologists’ Oral Histories; Voices from the past, Volumes 1 and 2 by U.S. Naval Cryptologic Veterans Association0
Review of Images of the National Archives Codebreakers by Stephen Twigge0
Review of The Forgotten Giant of Bletchley Park by Harold Liberty0
Arithmetic autocorrelation of binary m-sequences0
18th cryptologic history symposium0
Review of The First Enigma Codebreaker: The Untold Story of Marian Rejewski Who Passed the Baton to Alan Turing0
On security aspects of the ciphers T-310 and SKS with approved long-term keys0
Solving the Olum 1 Cipher0
Multidimensional zero-correlation linear cryptanalysis on uBlock and RAIN0
Cracking PURPLE: the identification of homologs in the cryptanalysis of the Angooki Taipu B cipher machine0
Cryptanalysis and improvement of Q. Peng et al.’s PVSS scheme0
A multi-step key recovery attack on reduced round Salsa and ChaCha0
Modifying twist algorithms for determining the key length of a Vigenère cipher0
Analysis of rotation and shift based diffusion functions0
Review of Behind the Enigma by John FerrisFerris, John. Behind the Enigma. The Authorized History of GCHQ, Britain’s Secret Cyber-Intelligence Agency 0
Multiple impossible differential cryptanalysis of reduced-round NBC0
The Condenser PBJ cipher machine0
Review of The Hidden History of Code-Breaking and 50 Codes That Changed the World , both by Sinclair McKay0
Dorabella unMASCed – the Dorabella Cipher is not an English or Latin Mono-Alphabetical Substitution Cipher0
Multi-party key exchange scheme based on supertropical semiring0
Meet-in-the-middle attacks on reduced round TweAES and NBC0
Correction0
Review of Madame X: The Story of ‘003’, the U.S. Army Cryptologic Bombe in World War II by Michael Barbakoff0
The origin of military cryptanalysis in Czechoslovakia0
Keys with nomenclatures in the early modern Europe0
Review of Backing Bletchley: The Codebreaking Outstations from Eastcote to GCHQ by Ronald Koorm0
Review of One Day in August by David O’Keefe0
Elizebeth Smith Friedman and one example of a prohibition era encryption system0
The Japanese Green Machine0
NSA honors two Cryptologia board members0
Side-channel attack–resistant PRESENT cipher by versatile key scheduling and compact S-box utilizing optimized three-phase logic design0
Complete examples of encryption systems broken by Elizebeth Smith Friedman: 1923–19340
Review of Before Bletchley Park: The Codebreakers of the First World War by Paul Gannon0
Deciphering the Voynich manuscript: propositions to unlock research0
Cryptologic History Symposium, May 8–10, 20240
Evaluating GPT-4’s proficiency in addressing cryptography examinations0
How we set new world records in breaking Playfair ciphertexts0
Bit inclusion test: an enhanced avalanche test for stream ciphers0
The Voynich Manuscript was written in a single, natural language0
Elizebeth Smith Friedman’s recovery of the wiring of two rotors from an enigma D machine0
Breaking the Silk Dress cryptogram0
Cryptographic symmetric structures based on quasigroups0
On latin squares, invariant differentials, random permutations and historical Enigma rotors0
The changes in Ottoman diplomatic cryptography and its methods during the 19th century (1811–1877)0
Unicity distance of the Zodiac-340 cipher0
Square impossible differential attack and security of AES in known plaintext scenario0
Review of Queen of Codes: The Secret Life of Emily Anderson, Britain’s Greatest Female Codebreaker by Jackie Uí Chionna0
Methods for encryption in early 19th-century Ottoman diplomatic correspondence0
The Voynich manuscript: discussion of text creation hypotheses0
The “Topaze stick fragment”—a newly discoveredrongorongo-inscribed artifact collected during the Rapa Nui (Easter Island) visit of HMSTopazein 18680
The undisclosed history of the Dutch governmental telex-message security 1945–19600
T.R. Hollcroft’s Problem0
A study of public key cryptosystems based on quasigroups0
Construction of cryptographically strong S-boxes from ternary quasigroups of order 40
Review of 100 People You Never Knew Were at Bletchley Park by Sinclair McKayMcKay, Sinclair. 100 People You Never Knew Were at Bletchley Park 0
Solving the Olum 2 cipher: a new approach to cryptanalysis of transposition ciphers0
Review of The Puzzle Master by Danielle Trussoni0
Why the French military cryptanalysis failed to break Enigma0
Expanded low-rank parity-check codes and their application to cryptography0
Review of Geniuses at War: Bletchley Park, Colossus, and the Dawn of the Digital Age by David A. Price0
Phrase-verified voting: Verifiable low-tech remote boardroom voting0
Review of Arctic Convoys by David KenyonKenyon, David. Arctic Convoys: Bletchley Park and the War for the Seas . New Haven and London: Yal0
Applying hierarchical clustering to homophonic substitution ciphers using historical corpora0
Review of Reflections of Alan Turing: A Relative Story by Dermot Turing0
In memoriam: Thomas Ralph Erskine CB (1933 – 2021)0
Review of The Bombe: The Machine that Defeated Enigma by Dermot Turing0
A review of the tropical approach in cryptography0
Deciphering an unjustly unresolved script: bl add MS 73525 folio 70
Cracking SIGABA in less than 24 hours on a consumer PC0
Review of Rongorongo : Inscribed Objects from Rapa Nui Paul Horley. Rongorongo: Inscribed Objects from Rapa Nui 0
Genevieve Grotjan’s “great discovery”0
UDM: Private user discovery with minimal information disclosure0
Review of Parker Hitt: The Father of American Military Cryptology by Betsy Rohaly Smoot0
Cipher key instructions in early modern Europe: analysis and text edition0
Deciphering three diplomatic letters sent by Maximilian II in 15750
An ultra-lightweight block cipher with string transformations0
Leo Marks’ “mental one-time pad”: an experimental cipher for British special operations in World War II0
The classified mathematical papers of A. A. Albert: a glimpse into the application of mathematics to cryptologic problems during the 1950s and 1960s0
0.029006958007812