Cryptologia

Papers
(The TQCC of Cryptologia is 1. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2022-05-01 to 2026-05-01.)
ArticleCitations
Review of Enigma Traitors by Dermot Turing7
Expanded low-rank parity-check codes and their application to cryptography7
Review of From the Ground Up by Betsy Rohaly SmootSmoot, Betsy Rohaly. 2023. From the Ground Up: American Cryptology during World War I . 6
Review of Rongorongo : Inscribed Objects from Rapa Nui Paul Horley. Rongorongo: Inscribed Objects from Rapa Nui 5
Review of the second edition of Craig Bauer’s “ Secret History: The Story of Cryptology, Second Edition3
Review of 100 People You Never Knew Were at Bletchley Park by Sinclair McKayMcKay, Sinclair. 100 People You Never Knew Were at Bletchley Park 3
Keys with nomenclatures in the early modern Europe3
The Voynich Manuscript was written in a single, natural language2
Accelerating pairings on BW10 and BW14 curves2
Isogeny formulae on extended Jacobi Quartic curves2
A treatise on the Rilke cryptogram2
Review of The Business of Secrets: Adventures in Selling Encryption Around the World by Fred Kinch2
Cracking PURPLE: the identification of homologs in the cryptanalysis of the Angooki Taipu B cipher machine2
The new golden age of decipherment2
Scytale riddle. Digging deeper2
On security aspects of the ciphers T-310 and SKS with approved long-term keys2
Square impossible differential attack and security of AES in known plaintext scenario2
Cryptanalysis of RSA with small difference of primes and two decryption exponents: Jochemsz and May approach2
Multiple impossible differential cryptanalysis of reduced-round NBC1
Differential cryptanalysis of the lightweight block cipher LELBC1
The changes in Ottoman diplomatic cryptography and its methods during the 19th century (1811–1877)1
Quantum key distribution: Bridging theoretical security proofs, practical attacks, and error correction for quantum-augmented networks1
Enumerating security analysis of NTRU cryptosystem1
Decentralized universally verifiable stake voting system with perfect privacy1
Review of Learning and Experiencing Cryptography with CrypTool and SageMath by Bernhard Esslinger1
Arithmetic autocorrelation of binary m-sequences1
An ultra-lightweight block cipher with string transformations1
Shadow IT in higher education: survey and case study for cybersecurity1
Optimizing tweaked Montgomery curves and its application in isogeny-based cryptography1
The influence of Bletchley Park on UK mathematics1
Notes about imbalance and arithmetic autocorrelation of N -ary half- l -sequences1
Cryptologic History Symposium, May 8–10, 20241
0.10093903541565