Cryptologia

Papers
(The TQCC of Cryptologia is 1. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2020-04-01 to 2024-04-01.)
ArticleCitations
Quasigroups and their applications in cryptography16
Analyzing student understanding of cryptography using the SOLO taxonomy5
Enigma: the spoils of Gustave Bertrand, or “par où tout a commencé”4
Cryptanalysis of two similar chaos-based image encryption schemes4
Methods for encryption in early 19th-century Ottoman diplomatic correspondence4
A review of the tropical approach in cryptography4
Cryptanalysis of RSA with small difference of primes and two decryption exponents: Jochemsz and May approach3
Shadow IT in higher education: survey and case study for cybersecurity2
Complete examples of encryption systems broken by Elizebeth Smith Friedman: 1923–19342
Arithmetic autocorrelation of binary m-sequences2
Benford’s law in the Beale ciphers2
Quasigroups and substitution permutation networks: a failed experiment2
On the failure of the smart approach of the GPT cryptosystem2
A nonlinear invariant attack on T-310 with the original Boolean function2
Deciphering papal ciphers from the 16th to the 18th Century2
Enigma, the XYZ period (1939–1940)2
Construction of cryptographically strong S-boxes from ternary quasigroups of order 42
A novel Collatz conjecture-based digital image watermarking method2
Efficient data encryption technique using quaternions for wireless sensor network2
How we set new world records in breaking Playfair ciphertexts1
Cracking SIGABA in less than 24 hours on a consumer PC1
Cryptanalysis and improvement of a blind multi-document signcryption scheme1
Solving the Olum 1 Cipher1
Review of The Nazi Spy Ring in America by Rhodri Jeffreys-Jones1
Cryptographic symmetric structures based on quasigroups1
Review of Crypto Wars—The Fight for Privacy in the Digital Age: A Political History of Digital Encryption1
Review of The linguistics of the Voynich manuscript by Claire Bowern and Luke Lindemann1
Genevieve Grotjan’s “great discovery”1
A statistical cryptanalysis of the Beale ciphers1
Breaking the Silk Dress cryptogram1
Sidon sets and statistics of the ElGamal function1
Elizebeth Smith Friedman and one example of a prohibition era encryption system1
Resource guide for teaching post-quantum cryptography1
The first Czechoslovak cipher machine1
A treatise on the Rilke cryptogram1
Elizebeth Smith Friedman’s recovery of the wiring of two rotors from an enigma D machine1
Cracking PURPLE: the identification of homologs in the cryptanalysis of the Angooki Taipu B cipher machine1
The changes in Ottoman diplomatic cryptography and its methods during the 19th century (1811–1877)1
Phrase-verified voting: Verifiable low-tech remote boardroom voting1
Analysis of rotation and shift based diffusion functions1
Review of Codebreaker Girls: A Secret Life at Bletchley Park by Jan Slimming1
Review of The Rose Code by Kate Quinn1
Rudyard Kipling’s unsolved cryptogram1
0.041134119033813