Cryptologia

Papers
(The median citation count of Cryptologia is 0. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2020-03-01 to 2024-03-01.)
ArticleCitations
Quasigroups and their applications in cryptography16
Analyzing student understanding of cryptography using the SOLO taxonomy5
Enigma: the spoils of Gustave Bertrand, or “par où tout a commencé”4
Cryptanalysis of two similar chaos-based image encryption schemes4
Methods for encryption in early 19th-century Ottoman diplomatic correspondence4
A review of the tropical approach in cryptography4
Cryptanalysis of RSA with small difference of primes and two decryption exponents: Jochemsz and May approach3
Complete examples of encryption systems broken by Elizebeth Smith Friedman: 1923–19342
A novel Collatz conjecture-based digital image watermarking method2
Efficient data encryption technique using quaternions for wireless sensor network2
Shadow IT in higher education: survey and case study for cybersecurity2
On the failure of the smart approach of the GPT cryptosystem2
A nonlinear invariant attack on T-310 with the original Boolean function2
Arithmetic autocorrelation of binary m-sequences2
Benford’s law in the Beale ciphers2
Quasigroups and substitution permutation networks: a failed experiment2
Construction of cryptographically strong S-boxes from ternary quasigroups of order 42
Construction of a polynomial invariant annihilation attack of degree 7 for T-3102
Deciphering papal ciphers from the 16th to the 18th Century2
Enigma, the XYZ period (1939–1940)2
Review of The Rose Code by Kate Quinn1
Elizebeth Smith Friedman’s recovery of the wiring of two rotors from an enigma D machine1
Breaking the Silk Dress cryptogram1
Sidon sets and statistics of the ElGamal function1
Solving the Olum 1 Cipher1
Review of The Nazi Spy Ring in America by Rhodri Jeffreys-Jones1
Cryptographic symmetric structures based on quasigroups1
Review of The linguistics of the Voynich manuscript by Claire Bowern and Luke Lindemann1
How we set new world records in breaking Playfair ciphertexts1
The changes in Ottoman diplomatic cryptography and its methods during the 19th century (1811–1877)1
Sources and methods for cryptologic history: the William and Elizebeth Smith Friedman collections1
Elizebeth Smith Friedman and one example of a prohibition era encryption system1
Resource guide for teaching post-quantum cryptography1
A treatise on the Rilke cryptogram1
The first Czechoslovak cipher machine1
Genevieve Grotjan’s “great discovery”1
A statistical cryptanalysis of the Beale ciphers1
Cryptanalysis and improvement of a blind multi-document signcryption scheme1
Phrase-verified voting: Verifiable low-tech remote boardroom voting1
Analysis of rotation and shift based diffusion functions1
Review of Codebreaker Girls: A Secret Life at Bletchley Park by Jan Slimming1
Rudyard Kipling’s unsolved cryptogram1
Applying hierarchical clustering to homophonic substitution ciphers using historical corpora0
Can musical encryption be both? A survey of music-based ciphers0
Sources and methods: uncovering the story of American Cryptology in World War I0
The ciphers of the Republic of Venice an overview0
Cracking SIGABA in less than 24 hours on a consumer PC0
Review of Flight of the Fox by Gray Basnight0
An improved cryptanalysis of multi-prime RSA with specific forms of decryption exponent0
Review of The Bombe: The Machine that Defeated Enigma by Dermot Turing0
Correction0
Review of Crypto Wars—The Fight for Privacy in the Digital Age: A Political History of Digital Encryption0
Review of The Puzzle Master by Danielle TrussoniTrussoni, Danielle. 2023. The Puzzle Master . New York, NY: Random House. https://www.rand0
Expanded low-rank parity-check codes and their application to cryptography0
The new golden age of decipherment0
Review of Parker Hitt: The Father of American Military Cryptology by Betsy Rohaly Smoot0
Review of the second edition of Craig Bauer’s “ Secret History: The Story of Cryptology, Second Edition ”Bauer, Craig P. Secret History: The Story of Cryp0
FCSR connection integers: efficient generation, testing and counting0
Review of The First Enigma Codebreaker: The Untold Story of Marian Rejewski Who Passed the Baton to Alan Turing Gawłowski, Robert. The First Enigma Codebr0
Review of Reflections of Alan Turing: A Relative Story by Dermot Turing0
Review of The Woman All Spies Fear by Amy Butler Greenfield and Code Breaker, Spy Hunter by Laurie Wallmark, Illustrated by Brooke Smart0
Improvements on k-error linear complexity of q-ary sequences derived from Euler quotients0
18th cryptologic history symposium0
Modern cryptanalysis of the Truppenschlüssel0
On latin squares, invariant differentials, random permutations and historical Enigma rotors0
Analysis of a late 19th century french cipher created by Major Josse0
Sources and methods for cryptologic history: NSA.gov - a tour through its history and resources0
Review of 100 People You Never Knew Were at Bletchley Park by Sinclair McKay0
Review of The U.S. Navy's On-the-Roof Gang, Volume Two, War in the Pacific by Matt Zullo0
Eavesdropping on the Biafra-Lisbon link – breaking historical ciphers from the Biafran war0
A study of public key cryptosystems based on quasigroups0
Review of Bletchley Park and D-Day by David Kenyon0
Cracking PURPLE: the identification of homologs in the cryptanalysis of the Angooki Taipu B cipher machine0
Solving the Olum 2 cipher: a new approach to cryptanalysis of transposition ciphers0
Review ofRongorongo:Inscribed Objects from Rapa Nui0
Review of The Real Special Relationship by Michael SmithSmith, Michael. The Real Special Relationship: The True Story of How the British and US Secret Ser0
Identifying concealed messages using authorship attribution0
The undisclosed history of the Dutch governmental telex-message security 1945–19600
Review of The Enigma Affair by Charlie LovettLovett, Charlie. The Enigma Affair . Ashland, OR: Blackstone Publishing. 2022. 323 pages, Har0
Review of The Codebreakers of Bletchley Park by Dermot Turing0
The Voynich manuscript: discussion of text creation hypotheses0
A French cipher from the late 19th century0
UDM: Private user discovery with minimal information disclosure0
Review of Madame X: The Story of ‘003’, the U.S. Army Cryptologic Bombe in World War II by Michael Barbakoff0
Sources and methods: Searching for cryptologic records in the findings of post-World War II allied technical surveys and commissions0
The Japanese Green Machine0
Leo Marks’ “mental one-time pad”: an experimental cipher for British special operations in World War II0
Review of classical cryptology at play by Silvio Coccaro0
Sources and methods for cryptologic history: researching individuals (and the biography boom)0
The origin of military cryptanalysis in Czechoslovakia0
Review of Codebreaking: A Practical Guide by Elonka Dunin and Klaus Schmeh0
Review of Behind the Enigma by John Ferris0
Review of Before Bletchley Park: The Codebreakers of the First World War by Paul Gannon0
Review of Queen of Codes: The Secret Life of Emily Anderson, Britain’s Greatest Female Codebreaker by Jackie Uí ChionnaChionna, Jackie Uí. Queen of Codes:0
In memoriam: Thomas Ralph Erskine CB (1933 – 2021)0
NSA honors two Cryptologia board members0
The Codebreakers war: David Kahn, Macmillan, the government, and the making of a cryptologic history masterpiece0
Sources and methods: contingency and its role in researching records of cryptologic history - a discussion and some lessons to apply for future research0
Review of One Day in August by David O’Keefe0
Review of Breaking Teleprinter Ciphers at Bletchley Park by James A. Reeds, Whitfield Diffie, and J. V. Field0
Why the French military cryptanalysis failed to break Enigma0
Review of Radio War: The Secret Espionage War of the Radio Security Service 1938–1946 by David Abrutat0
Bit inclusion test: an enhanced avalanche test for stream ciphers0
Review of From the Ground Up by Betsy Rohaly SmootSmoot, Betsy Rohaly. 2023. From the Ground Up: American Cryptology during World War I . 0
Herbert O. Yardley revisited: what does the new evidence say?0
Cryptologic History Symposium, May 8–10, 20240
Decentralized universally verifiable stake voting system with perfect privacy0
Cryptanalysis and improvement of Q. Peng et al.’s PVSS scheme0
Review of The Secret Life of an American Codebreaker: Codebreaker Girls by Jan SlimmingSlimming, Jan. The Secret Life of an American Codebreaker: Codebrea0
Modifying twist algorithms for determining the key length of a Vigenère cipher0
Review of A Course in Cryptography by Heiko Knospe0
Review of No More Secrets: My Part in Codebreaking at Bletchley Park and the Pentagon by Betty Webb0
Review of USN & USMC WW II Cryptologists’ Oral Histories; Voices from the past, Volumes 1 and 2 by U.S. Naval Cryptologic Veterans Association0
Genetic algorithm attack on Enigma’s plugboard0
Review of Eavesdropping on the Emperor: Interrogators and Codebreakers in Britain’s War with Japan by Peter Kornicki0
Review of Geniuses at War: Bletchley Park, Colossus, and the Dawn of the Digital Age by David A. Price0
Review of The Rohonc Code: Tracing a Historical Riddle by Benedek Láng0
Deciphering Mary Stuart’s lost letters from 1578-15840
Review of The Bletchley Park Codebreakers in their own words by Joel Greenberg0
Unicity distance of the Zodiac-340 cipher0
Statistical tests suites analysis methods. Cryptographic recommendations0
Dorabella unMASCed – the Dorabella Cipher is not an English or Latin Mono-Alphabetical Substitution Cipher0
Cryptography in undergraduate education: perceptions of postgraduate students0
Review of codebreaker by Marc McMenamin0
An ultra-lightweight block cipher with string transformations0
Review of Images of the National Archives Codebreakers by Stephen Twigge0
Deciphering three diplomatic letters sent by Maximilian II in 15750
Deciphering the Voynich manuscript: propositions to unlock research0
Ludlings: not all fun and games0
Review of Operation Vengeance: The Astonishing Aerial Ambush That Changed World War II by Dan Hampton0
Deciphering German diplomatic and naval attaché messages from 1900-19150
Review of The U.S. Navy's On-the-Roof Gang, Volume One, Prelude to War by Matt Zullo0
Review of Backing Bletchley: The Codebreaking Outstations from Eastcote to GCHQ by Ronald Koorm0
Keys with nomenclatures in the early modern Europe0
Sources and methods series: considering other record groups in Nara holding cryptologic and cryptologic-related records0
On security aspects of the ciphers T-310 and SKS with approved long-term keys0
Review of code cracking for kids by Jean Daigneau0
T.R. Hollcroft’s Problem0
Review of The Enigma Bulletin edited by Zdzisław J. Kapera0
0.056743860244751