Cryptologia

Papers
(The TQCC of Cryptologia is 1. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2020-11-01 to 2024-11-01.)
ArticleCitations
A review of the tropical approach in cryptography6
Methods for encryption in early 19th-century Ottoman diplomatic correspondence4
Deciphering Mary Stuart’s lost letters from 1578-15844
Complete examples of encryption systems broken by Elizebeth Smith Friedman: 1923–19343
Construction of cryptographically strong S-boxes from ternary quasigroups of order 43
Shadow IT in higher education: survey and case study for cybersecurity3
Arithmetic autocorrelation of binary m-sequences3
Cryptanalysis of RSA with small difference of primes and two decryption exponents: Jochemsz and May approach3
Elizebeth Smith Friedman and one example of a prohibition era encryption system2
The first Czechoslovak cipher machine2
Improvements on k-error linear complexity of q-ary sequences derived from Euler quotients2
Enigma, the XYZ period (1939–1940)2
Review of Rongorongo : Inscribed Objects from Rapa Nui Paul Horley. Rongorongo: Inscribed Objects from Rapa Nui 2
Cryptographic symmetric structures based on quasigroups2
Resource guide for teaching post-quantum cryptography1
A treatise on the Rilke cryptogram1
Review of Crypto Wars—The Fight for Privacy in the Digital Age: A Political History of Digital Encryption1
How we set new world records in breaking Playfair ciphertexts1
Breaking the Silk Dress cryptogram1
The changes in Ottoman diplomatic cryptography and its methods during the 19th century (1811–1877)1
Solving the Olum 1 Cipher1
Review of Codebreaking: A Practical Guide by Elonka Dunin and Klaus Schmeh1
Review of Codebreaker Girls: A Secret Life at Bletchley Park by Jan Slimming1
Review of The Rose Code by Kate Quinn1
Genevieve Grotjan’s “great discovery”1
Modifying twist algorithms for determining the key length of a Vigenère cipher1
Cracking PURPLE: the identification of homologs in the cryptanalysis of the Angooki Taipu B cipher machine1
A statistical cryptanalysis of the Beale ciphers1
Deciphering three diplomatic letters sent by Maximilian II in 15751
Review of The Nazi Spy Ring in America by Rhodri Jeffreys-Jones1
Review of The linguistics of the Voynich manuscript by Claire Bowern and Luke Lindemann1
Rudyard Kipling’s unsolved cryptogram1
Elizebeth Smith Friedman’s recovery of the wiring of two rotors from an enigma D machine1
UDM: Private user discovery with minimal information disclosure1
Cracking SIGABA in less than 24 hours on a consumer PC1
Phrase-verified voting: Verifiable low-tech remote boardroom voting1
Analysis of rotation and shift based diffusion functions1
0.074587106704712