Cryptologia

Papers
(The median citation count of Cryptologia is 0. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2020-09-01 to 2024-09-01.)
ArticleCitations
A review of the tropical approach in cryptography6
Cryptanalysis of two similar chaos-based image encryption schemes5
Deciphering Mary Stuart’s lost letters from 1578-15844
Methods for encryption in early 19th-century Ottoman diplomatic correspondence4
A novel Collatz conjecture-based digital image watermarking method3
Shadow IT in higher education: survey and case study for cybersecurity3
Arithmetic autocorrelation of binary m-sequences3
Cryptanalysis of RSA with small difference of primes and two decryption exponents: Jochemsz and May approach3
Construction of cryptographically strong S-boxes from ternary quasigroups of order 43
Complete examples of encryption systems broken by Elizebeth Smith Friedman: 1923–19343
Elizebeth Smith Friedman and one example of a prohibition era encryption system2
Cryptographic symmetric structures based on quasigroups2
Improvements on k-error linear complexity of q-ary sequences derived from Euler quotients2
Benford’s law in the Beale ciphers2
The first Czechoslovak cipher machine2
Review of Rongorongo : Inscribed Objects from Rapa Nui Paul Horley. Rongorongo: Inscribed Objects from Rapa Nui 2
Enigma, the XYZ period (1939–1940)2
Analysis of rotation and shift based diffusion functions1
Resource guide for teaching post-quantum cryptography1
A treatise on the Rilke cryptogram1
Review of Crypto Wars—The Fight for Privacy in the Digital Age: A Political History of Digital Encryption1
How we set new world records in breaking Playfair ciphertexts1
Cracking PURPLE: the identification of homologs in the cryptanalysis of the Angooki Taipu B cipher machine1
Modifying twist algorithms for determining the key length of a Vigenère cipher1
Solving the Olum 1 Cipher1
Review of Codebreaking: A Practical Guide by Elonka Dunin and Klaus Schmeh1
Review of Codebreaker Girls: A Secret Life at Bletchley Park by Jan Slimming1
Review of The Rose Code by Kate Quinn1
Genevieve Grotjan’s “great discovery”1
On the failure of the smart approach of the GPT cryptosystem1
Cracking SIGABA in less than 24 hours on a consumer PC1
A statistical cryptanalysis of the Beale ciphers1
Deciphering three diplomatic letters sent by Maximilian II in 15751
Review of The Nazi Spy Ring in America by Rhodri Jeffreys-Jones1
Review of The linguistics of the Voynich manuscript by Claire Bowern and Luke Lindemann1
Rudyard Kipling’s unsolved cryptogram1
Elizebeth Smith Friedman’s recovery of the wiring of two rotors from an enigma D machine1
Breaking the Silk Dress cryptogram1
The changes in Ottoman diplomatic cryptography and its methods during the 19th century (1811–1877)1
Phrase-verified voting: Verifiable low-tech remote boardroom voting1
Review of codebreaker by Marc McMenamin0
Review of The Codebreakers of Bletchley Park by Dermot Turing0
Correction0
Statistical tests suites analysis methods. Cryptographic recommendations0
UDM: Private user discovery with minimal information disclosure0
Expanded low-rank parity-check codes and their application to cryptography0
Review of The U.S. Navy's On-the-Roof Gang, Volume One, Prelude to War by Matt Zullo0
Review of the second edition of Craig Bauer’s “ Secret History: The Story of Cryptology, Second Edition ”Bauer, Craig P. Secret History: The Story of Cryp0
Why the French military cryptanalysis failed to break Enigma0
Review of The Enigma Affair by Charlie LovettLovett, Charlie. The Enigma Affair . Ashland, OR: Blackstone Publishing. 2022. 323 pages, Har0
Evaluating GPT-4’s proficiency in addressing cryptography examinations0
Solving the Olum 2 cipher: a new approach to cryptanalysis of transposition ciphers0
Review of The First Enigma Codebreaker: The Untold Story of Marian Rejewski Who Passed the Baton to Alan Turing0
The ciphers of the Republic of Venice an overview0
Review of Images of the National Archives Codebreakers by Stephen Twigge0
Can musical encryption be both? A survey of music-based ciphers0
Square impossible differential attack and security of AES in known plaintext scenario0
Sources and methods: Searching for cryptologic records in the findings of post-World War II allied technical surveys and commissions0
NSA honors two Cryptologia board members0
A multi-step key recovery attack on reduced round Salsa and ChaCha0
Review of The Real Special Relationship by Michael SmithSmith, Michael. The Real Special Relationship: The True Story of How the British and US Secret Ser0
Review of The Puzzle Master by Danielle TrussoniTrussoni, Danielle. 2023. The Puzzle Master . New York, NY: Random House. https://www.rand0
Review of Flight of the Fox by Gray Basnight0
In memoriam: Thomas Ralph Erskine CB (1933 – 2021)0
Review of The Rohonc Code: Tracing a Historical Riddle by Benedek Láng0
Leo Marks’ “mental one-time pad”: an experimental cipher for British special operations in World War II0
Sources and methods: contingency and its role in researching records of cryptologic history - a discussion and some lessons to apply for future research0
Review of Parker Hitt: The Father of American Military Cryptology by Betsy Rohaly Smoot0
Review of Backing Bletchley: The Codebreaking Outstations from Eastcote to GCHQ by Ronald Koorm0
Review of the expanded edition of Codebreaking: A Practical Guide by Elonka Dunin and Klaus SchmehDunin, Elonka and Klaus, Schmeh. Codebreaking: A Practic0
Cryptologic History Symposium, May 8–10, 20240
Review of The Woman All Spies Fear by Amy Butler Greenfield and Code Breaker, Spy Hunter by Laurie Wallmark, Illustrated by Brooke Smart0
Review of USN & USMC WW II Cryptologists’ Oral Histories; Voices from the past, Volumes 1 and 2 by U.S. Naval Cryptologic Veterans Association0
The Voynich manuscript: discussion of text creation hypotheses0
Modern cryptanalysis of the Truppenschlüssel0
Review of Geniuses at War: Bletchley Park, Colossus, and the Dawn of the Digital Age by David A. Price0
Review of Arctic Convoys by David KenyonKenyon, David. Arctic Convoys: Bletchley Park and the War for the Seas . New Haven and London: Yal0
Review of The U.S. Navy's On-the-Roof Gang, Volume Two, War in the Pacific by Matt Zullo0
Side-channel attack–resistant PRESENT cipher by versatile key scheduling and compact S-box utilizing optimized three-phase logic design0
A study of public key cryptosystems based on quasigroups0
Review of The Secret Life of an American Codebreaker: Codebreaker Girls by Jan SlimmingSlimming, Jan. The Secret Life of an American Codebreaker: Codebrea0
Review of Reflections of Alan Turing: A Relative Story by Dermot Turing0
Decentralized universally verifiable stake voting system with perfect privacy0
An ultra-lightweight block cipher with string transformations0
Fault-assisted side-channel analysis of HMAC-Streebog0
18th cryptologic history symposium0
Review of Behind the Enigma by John FerrisFerris, John. Behind the Enigma. The Authorized History of GCHQ, Britain’s Secret Cyber-Intelligence Agency 0
The new golden age of decipherment0
Analysis of a late 19th century french cipher created by Major Josse0
The undisclosed history of the Dutch governmental telex-message security 1945–19600
The Condenser PBJ cipher machine0
Review of 100 People You Never Knew Were at Bletchley Park by Sinclair McKayMcKay, Sinclair. 100 People You Never Knew Were at Bletchley Park 0
Review of Madame X: The Story of ‘003’, the U.S. Army Cryptologic Bombe in World War II by Michael Barbakoff0
Deciphering the Voynich manuscript: propositions to unlock research0
T.R. Hollcroft’s Problem0
Multiple impossible differential cryptanalysis of reduced-round NBC0
Review of Operation Vengeance: The Astonishing Aerial Ambush That Changed World War II by Dan Hampton0
Sources and methods for cryptologic history: researching individuals (and the biography boom)0
Bit inclusion test: an enhanced avalanche test for stream ciphers0
FCSR connection integers: efficient generation, testing and counting0
Applying hierarchical clustering to homophonic substitution ciphers using historical corpora0
An artificial neural network approach to finding the key length of the Vigenère cipher0
Review of The Bombe: The Machine that Defeated Enigma by Dermot Turing0
Cryptanalysis and improvement of Q. Peng et al.’s PVSS scheme0
The Codebreakers war: David Kahn, Macmillan, the government, and the making of a cryptologic history masterpiece0
Review of The Bletchley Park Codebreakers in their own words by Joel Greenberg0
The Immortal David Kahn0
Review of Radio War: The Secret Espionage War of the Radio Security Service 1938–1946 by David Abrutat0
The Japanese Green Machine0
Sources and methods: uncovering the story of American Cryptology in World War I0
Review of No More Secrets: My Part in Codebreaking at Bletchley Park and the Pentagon by Betty WebbWebb, Betty. No More Secrets: My Part in codebreaking a0
Review of Before Bletchley Park: The Codebreakers of the First World War by Paul Gannon0
Keys with nomenclatures in the early modern Europe0
The “Topaze stick fragment”—a newly discovered rongorongo -inscribed artifact collected during the Rapa Nui (Easter Island) visit of HMS Topaze 0
An improved cryptanalysis of multi-prime RSA with specific forms of decryption exponent0
Cryptography in undergraduate education: perceptions of postgraduate students0
Dorabella unMASCed – the Dorabella Cipher is not an English or Latin Mono-Alphabetical Substitution Cipher0
Review of Eavesdropping on the Emperor: Interrogators and Codebreakers in Britain’s War with Japan by Peter Kornicki0
Review of One Day in August by David O’Keefe0
Review of A Course in Cryptography by Heiko Knospe0
Deciphering an unjustly unresolved script: bl add MS 73525 folio 70
The origin of military cryptanalysis in Czechoslovakia0
Review of From the Ground Up by Betsy Rohaly SmootSmoot, Betsy Rohaly. 2023. From the Ground Up: American Cryptology during World War I . 0
Review of Queen of Codes: The Secret Life of Emily Anderson, Britain’s Greatest Female Codebreaker by Jackie Uí Chionna0
On latin squares, invariant differentials, random permutations and historical Enigma rotors0
Unicity distance of the Zodiac-340 cipher0
Review of Breaking Teleprinter Ciphers at Bletchley Park by James A. Reeds, Whitfield Diffie, and J. V. Field0
Classifying World War II era ciphers with machine learning0
On security aspects of the ciphers T-310 and SKS with approved long-term keys0
0.032093048095703