Cryptologia

Papers
(The TQCC of Cryptologia is 2. The table below lists those papers that are above that threshold based on CrossRef citation counts. The publications cover those that have been published in the past four years, i.e., from 2019-06-01 to 2023-06-01.)
ArticleCitations
Phishing in an academic community: A study of user susceptibility and behavior20
Designing a pseudorandom bit generator based on LFSRs and a discrete chaotic map19
An adaptive color image steganography method using adjacent pixel value differencing and LSB substitution technique15
An IBE-based design for assured deletion in cloud storage14
QR code–based ECG signal encryption/decryption algorithm11
CHAOS IN CRYPTOGRAPHY: THE ESCAPE FROM THE STRANGE ATTRACTOR8
Parallel cryptographic hashing: Developments in the last 25 years6
FROM THE ARCHIVES GC AND CS MOBILIZES “MEN OF THE PROFESSOR TYPE”6
SAS-SIP: A secure authentication scheme based on ECC and a fuzzy extractor for session initiation protocol6
Linear cryptanalysis and block cipher design in East Germany in the 1970s6
Enigma Wiring Data: Interpreting Allied Conventions from World War II5
Optimal differential trails in lightweight block ciphers ANU and PICO5
WHAT DID THE SINKOV MISSION RECEIVE FROM BLETCHLEY PARK?5
FROM THE ARCHIVES WHAT THE SINKOV MISSION BROUGHT TO BLETCHLEY PARK5
Deciphering ADFGVX messages from the Eastern Front of World War I4
Problems and solutions from the fourth International Students’ Olympiad in Cryptography (NSUCRYPTO)4
From the Archives: Inside a Cold War Crypto Cell. Polish Cipher Bureau in the 1980s4
Variable elimination strategies and construction of nonlinear polynomial invariant attacks on T-3104
LICID: a lightweight image cryptosystem for IoT devices4
Twisting the Keyword Length from a Vigenère Cipher3
From the Archives: The U.S. and West German Agent Radio Ciphers3
From the Archives: Breaking OTP Ciphers3
How I Broke an Encrypted Diary from the War of 18123
FROM BLETCHLEY PARK TO BERCHTESGADEN3
Slide attacks and LC-weak keys in T-3103
The Fifth International Students’ Olympiad in cryptography—NSUCRYPTO: Problems and their solutions3
A possible generating algorithm of the Voynich manuscript3
Lessons Learned from a Mathematical Cryptology Course3
Exploring a mysterious tablet from Easter Island: the issues of authenticity and falsifiability inrongorongostudies2
FROM THE ARCHIVES: A BLETCHLEY PARK ASSESSMENT OF GERMAN INTELLIGENCE ON TORCH2
From the Archives: The Last Bombe Run, 19552
MGR Hash Functions2
Deciphering papal ciphers from the 16th to the 18th Century2
The cifra delle caselle a XVI Century superencrypted cipher2
FROM THE ARCHIVES TUNNY DECRYPTS2
Block-based fuzzy-image authentication method2
How to explain modern security concepts to your children2
A TURNING GRILLE FROM THE ANCESTRAL CASTLE OF THE DUTCH STADTHOLDERS2
From the Archives: CX–52 Messages Read by Red Poles?2
Cryptanalysis of Enigma double indicators with hill climbing2
0.11725211143494