Cryptologia

Papers
(The median citation count of Cryptologia is 0. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2020-11-01 to 2024-11-01.)
ArticleCitations
A review of the tropical approach in cryptography6
Methods for encryption in early 19th-century Ottoman diplomatic correspondence4
Deciphering Mary Stuart’s lost letters from 1578-15844
Arithmetic autocorrelation of binary m-sequences3
Cryptanalysis of RSA with small difference of primes and two decryption exponents: Jochemsz and May approach3
Complete examples of encryption systems broken by Elizebeth Smith Friedman: 1923–19343
Construction of cryptographically strong S-boxes from ternary quasigroups of order 43
Shadow IT in higher education: survey and case study for cybersecurity3
Review of Rongorongo : Inscribed Objects from Rapa Nui Paul Horley. Rongorongo: Inscribed Objects from Rapa Nui 2
Cryptographic symmetric structures based on quasigroups2
Elizebeth Smith Friedman and one example of a prohibition era encryption system2
The first Czechoslovak cipher machine2
Improvements on k-error linear complexity of q-ary sequences derived from Euler quotients2
Enigma, the XYZ period (1939–1940)2
Elizebeth Smith Friedman’s recovery of the wiring of two rotors from an enigma D machine1
UDM: Private user discovery with minimal information disclosure1
Cracking SIGABA in less than 24 hours on a consumer PC1
Phrase-verified voting: Verifiable low-tech remote boardroom voting1
Analysis of rotation and shift based diffusion functions1
Resource guide for teaching post-quantum cryptography1
A treatise on the Rilke cryptogram1
Review of Crypto Wars—The Fight for Privacy in the Digital Age: A Political History of Digital Encryption1
How we set new world records in breaking Playfair ciphertexts1
Breaking the Silk Dress cryptogram1
The changes in Ottoman diplomatic cryptography and its methods during the 19th century (1811–1877)1
Solving the Olum 1 Cipher1
Review of Codebreaking: A Practical Guide by Elonka Dunin and Klaus Schmeh1
Review of Codebreaker Girls: A Secret Life at Bletchley Park by Jan Slimming1
Review of The Rose Code by Kate Quinn1
Genevieve Grotjan’s “great discovery”1
Modifying twist algorithms for determining the key length of a Vigenère cipher1
Cracking PURPLE: the identification of homologs in the cryptanalysis of the Angooki Taipu B cipher machine1
A statistical cryptanalysis of the Beale ciphers1
Deciphering three diplomatic letters sent by Maximilian II in 15751
Review of The Nazi Spy Ring in America by Rhodri Jeffreys-Jones1
Review of The linguistics of the Voynich manuscript by Claire Bowern and Luke Lindemann1
Rudyard Kipling’s unsolved cryptogram1
Sources and methods: uncovering the story of American Cryptology in World War I0
Review of The Codebreakers of Bletchley Park by Dermot Turing0
Review of The Secret Life of an American Codebreaker: Codebreaker Girls by Jan SlimmingSlimming, Jan. The Secret Life of an American Codebreaker: Codebrea0
Keys with nomenclatures in the early modern Europe0
Review of Geniuses at War: Bletchley Park, Colossus, and the Dawn of the Digital Age by David A. Price0
Fault-assisted side-channel analysis of HMAC-Streebog0
Review of The Puzzle Master by Danielle Trussoni0
The new golden age of decipherment0
Review of Madame X: The Story of ‘003’, the U.S. Army Cryptologic Bombe in World War II by Michael Barbakoff0
T.R. Hollcroft’s Problem0
Evaluating GPT-4’s proficiency in addressing cryptography examinations0
Review of Behind the Enigma by John FerrisFerris, John. Behind the Enigma. The Authorized History of GCHQ, Britain’s Secret Cyber-Intelligence Agency 0
Review of Queen of Codes: The Secret Life of Emily Anderson, Britain’s Greatest Female Codebreaker by Jackie Uí Chionna0
Review of Images of the National Archives Codebreakers by Stephen Twigge0
Review of The First Enigma Codebreaker: The Untold Story of Marian Rejewski Who Passed the Baton to Alan Turing0
Review of Parker Hitt: The Father of American Military Cryptology by Betsy Rohaly Smoot0
Analysis of a late 19th century french cipher created by Major Josse0
Square impossible differential attack and security of AES in known plaintext scenario0
FCSR connection integers: efficient generation, testing and counting0
Review of The Bletchley Park Codebreakers in their own words by Joel Greenberg0
Cipher key instructions in early modern Europe: analysis and text edition0
Review of The Woman All Spies Fear by Amy Butler Greenfield and Code Breaker, Spy Hunter by Laurie Wallmark, Illustrated by Brooke Smart0
The Immortal David Kahn0
Deciphering the Voynich manuscript: propositions to unlock research0
Modern cryptanalysis of the Truppenschlüssel0
The Voynich manuscript: discussion of text creation hypotheses0
Review of Backing Bletchley: The Codebreaking Outstations from Eastcote to GCHQ by Ronald Koorm0
Review of The U.S. Navy's On-the-Roof Gang, Volume Two, War in the Pacific by Matt Zullo0
Review of Arctic Convoys by David KenyonKenyon, David. Arctic Convoys: Bletchley Park and the War for the Seas . New Haven and London: Yal0
Cryptologic History Symposium, May 8–10, 20240
Review of Enigma Traitors by Dermot Turing0
Solving the Olum 2 cipher: a new approach to cryptanalysis of transposition ciphers0
Review of USN & USMC WW II Cryptologists’ Oral Histories; Voices from the past, Volumes 1 and 2 by U.S. Naval Cryptologic Veterans Association0
Review of No More Secrets: My Part in Codebreaking at Bletchley Park and the Pentagon by Betty WebbWebb, Betty. No More Secrets: My Part in codebreaking a0
Can musical encryption be both? A survey of music-based ciphers0
The Japanese Green Machine0
An improved cryptanalysis of multi-prime RSA with specific forms of decryption exponent0
Review of Eavesdropping on the Emperor: Interrogators and Codebreakers in Britain’s War with Japan by Peter Kornicki0
Review of From the Ground Up by Betsy Rohaly SmootSmoot, Betsy Rohaly. 2023. From the Ground Up: American Cryptology during World War I . 0
Review of The Forgotten Giant of Bletchley Park by Harold Liberty0
An ultra-lightweight block cipher with string transformations0
Review of The Hidden History of Code-Breaking and 50 Codes That Changed the World , both by Sinclair McKay0
Review of Reflections of Alan Turing: A Relative Story by Dermot Turing0
Dorabella unMASCed – the Dorabella Cipher is not an English or Latin Mono-Alphabetical Substitution Cipher0
Multiple impossible differential cryptanalysis of reduced-round NBC0
18th cryptologic history symposium0
A multi-step key recovery attack on reduced round Salsa and ChaCha0
Classifying World War II era ciphers with machine learning0
Review of One Day in August by David O’Keefe0
Deciphering an unjustly unresolved script: bl add MS 73525 folio 70
Sources and methods for cryptologic history: researching individuals (and the biography boom)0
Review of 100 People You Never Knew Were at Bletchley Park by Sinclair McKayMcKay, Sinclair. 100 People You Never Knew Were at Bletchley Park 0
Multidimensional zero-correlation linear cryptanalysis on uBlock and RAIN0
An artificial neural network approach to finding the key length of the Vigenère cipher0
The undisclosed history of the Dutch governmental telex-message security 1945–19600
On latin squares, invariant differentials, random permutations and historical Enigma rotors0
The Codebreakers war: David Kahn, Macmillan, the government, and the making of a cryptologic history masterpiece0
Cryptanalysis and improvement of Q. Peng et al.’s PVSS scheme0
Bit inclusion test: an enhanced avalanche test for stream ciphers0
Review of Radio War: The Secret Espionage War of the Radio Security Service 1938–1946 by David Abrutat0
Correction0
Applying hierarchical clustering to homophonic substitution ciphers using historical corpora0
Review of The Enigma Affair by Charlie Lovett0
Decentralized universally verifiable stake voting system with perfect privacy0
Review of The Bombe: The Machine that Defeated Enigma by Dermot Turing0
The ciphers of the Republic of Venice an overview0
A study of public key cryptosystems based on quasigroups0
Review of the second edition of Craig Bauer’s “ Secret History: The Story of Cryptology, Second Edition0
Sources and methods: Searching for cryptologic records in the findings of post-World War II allied technical surveys and commissions0
Review of The Rohonc Code: Tracing a Historical Riddle by Benedek Láng0
Side-channel attack–resistant PRESENT cipher by versatile key scheduling and compact S-box utilizing optimized three-phase logic design0
The “Topaze stick fragment”—a newly discovered rongorongo -inscribed artifact collected during the Rapa Nui (Easter Island) visit of HMS Topaze 0
Leo Marks’ “mental one-time pad”: an experimental cipher for British special operations in World War II0
Review of Before Bletchley Park: The Codebreakers of the First World War by Paul Gannon0
The classified mathematical papers of A. A. Albert: a glimpse into the application of mathematics to cryptologic problems during the 1950s and 1960s0
Unicity distance of the Zodiac-340 cipher0
NSA honors two Cryptologia board members0
The Condenser PBJ cipher machine0
Review of the expanded edition of Codebreaking: A Practical Guide by Elonka Dunin and Klaus SchmehDunin, Elonka and Klaus, Schmeh. Codebreaking: A Practic0
Covert 19th century political intrigues of Tenerife nobility revealed by cryptanalyzing an encrypted letter0
Review of codebreaker by Marc McMenamin0
The origin of military cryptanalysis in Czechoslovakia0
In memoriam: Thomas Ralph Erskine CB (1933 – 2021)0
Statistical tests suites analysis methods. Cryptographic recommendations0
Why the French military cryptanalysis failed to break Enigma0
Review of Operation Vengeance: The Astonishing Aerial Ambush That Changed World War II by Dan Hampton0
Review of The U.S. Navy's On-the-Roof Gang, Volume One, Prelude to War by Matt Zullo0
Expanded low-rank parity-check codes and their application to cryptography0
On security aspects of the ciphers T-310 and SKS with approved long-term keys0
Review of The Real Special Relationship by Michael Smith0
0.026440858840942