Cryptologia

Papers
(The median citation count of Cryptologia is 0. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2022-05-01 to 2026-05-01.)
ArticleCitations
Expanded low-rank parity-check codes and their application to cryptography7
Review of Enigma Traitors by Dermot Turing7
Review of From the Ground Up by Betsy Rohaly SmootSmoot, Betsy Rohaly. 2023. From the Ground Up: American Cryptology during World War I . 6
Review of Rongorongo : Inscribed Objects from Rapa Nui Paul Horley. Rongorongo: Inscribed Objects from Rapa Nui 5
Keys with nomenclatures in the early modern Europe3
Review of the second edition of Craig Bauer’s “ Secret History: The Story of Cryptology, Second Edition3
Review of 100 People You Never Knew Were at Bletchley Park by Sinclair McKayMcKay, Sinclair. 100 People You Never Knew Were at Bletchley Park 3
Review of The Business of Secrets: Adventures in Selling Encryption Around the World by Fred Kinch2
Cracking PURPLE: the identification of homologs in the cryptanalysis of the Angooki Taipu B cipher machine2
The new golden age of decipherment2
Scytale riddle. Digging deeper2
On security aspects of the ciphers T-310 and SKS with approved long-term keys2
Square impossible differential attack and security of AES in known plaintext scenario2
Cryptanalysis of RSA with small difference of primes and two decryption exponents: Jochemsz and May approach2
The Voynich Manuscript was written in a single, natural language2
Accelerating pairings on BW10 and BW14 curves2
Isogeny formulae on extended Jacobi Quartic curves2
A treatise on the Rilke cryptogram2
Decentralized universally verifiable stake voting system with perfect privacy1
Review of Learning and Experiencing Cryptography with CrypTool and SageMath by Bernhard Esslinger1
Arithmetic autocorrelation of binary m-sequences1
An ultra-lightweight block cipher with string transformations1
Shadow IT in higher education: survey and case study for cybersecurity1
Optimizing tweaked Montgomery curves and its application in isogeny-based cryptography1
The influence of Bletchley Park on UK mathematics1
Notes about imbalance and arithmetic autocorrelation of N -ary half- l -sequences1
Cryptologic History Symposium, May 8–10, 20241
Multiple impossible differential cryptanalysis of reduced-round NBC1
Differential cryptanalysis of the lightweight block cipher LELBC1
The changes in Ottoman diplomatic cryptography and its methods during the 19th century (1811–1877)1
Quantum key distribution: Bridging theoretical security proofs, practical attacks, and error correction for quantum-augmented networks1
Enumerating security analysis of NTRU cryptosystem1
Can musical encryption be both? A survey of music-based ciphers0
A study of public key cryptosystems based on quasigroups0
Review of Arctic Convoys by David KenyonKenyon, David. Arctic Convoys: Bletchley Park and the War for the Seas . New Haven and London: Yal0
Review of The First Enigma Codebreaker: The Untold Story of Marian Rejewski Who Passed the Baton to Alan Turing0
Compression, correction, confidentiality, and comprehension: a modern look at telegraph codebooks0
Review of The Puzzle Master by Danielle Trussoni0
RSA+: an RSA variant0
Elizebeth Smith Friedman’s recovery of the wiring of two rotors from an enigma D machine0
Bit inclusion test: an enhanced avalanche test for stream ciphers0
Covert 19th century political intrigues of Tenerife nobility revealed by cryptanalyzing an encrypted letter0
Review of The Forgotten Giant of Bletchley Park by Harold Liberty0
Breaking the Silk Dress cryptogram0
Analysis of rotation and shift based diffusion functions0
Review of Behind the Enigma by John FerrisFerris, John. Behind the Enigma. The Authorized History of GCHQ, Britain’s Secret Cyber-Intelligence Agency 0
Review of The “Lives” and Writings of Edith Rickert (1871–1938) by Christina von Nolcken0
A multi-step key recovery attack on reduced round Salsa and ChaCha0
Modifying twist algorithms for determining the key length of a Vigenère cipher0
An improved cryptanalysis of multi-prime RSA with specific forms of decryption exponent0
Review of The Secret Life of an American Codebreaker: Codebreaker Girls by Jan SlimmingSlimming, Jan. The Secret Life of an American Codebreaker: Codebrea0
Mechanical implementation of cryptography over Galois fields0
Leo Marks’ “mental one-time pad”: an experimental cipher for British special operations in World War II0
Deciphering an unjustly unresolved script: bl add MS 73525 folio 70
Review of the expanded edition of Codebreaking: A Practical Guide by Elonka Dunin and Klaus SchmehDunin, Elonka and Klaus, Schmeh. Codebreaking: A Practic0
Cipher key instructions in early modern Europe: analysis and text edition0
Classifying World War II era ciphers with machine learning0
Why the French military cryptanalysis failed to break Enigma0
Evaluating GPT-4’s proficiency in addressing cryptography examinations0
Review of The Holocaust Codes: The Untold Story of Decrypting the Final Solution by Christian Jennings0
The Condenser PBJ cipher machine0
Development of obfuscation techniques in Vienna during the early modern era0
Side-channel attack–resistant PRESENT cipher by versatile key scheduling and compact S-box utilizing optimized three-phase logic design0
Review of The Bletchley Park Codebreakers in their own words by Joel Greenberg0
Review of The Hidden History of Code-Breaking and 50 Codes That Changed the World , both by Sinclair McKay0
The Immortal David Kahn0
Review of The Real Special Relationship by Michael Smith0
Revealing secrets from WWII: the original German instructions of Schlüsselgerät 410
Dilithium/2 = Lithium? Post-quantum signatures for undergraduate classes0
Genevieve Grotjan’s “great discovery”0
Fault-assisted side-channel analysis of HMAC-Streebog0
The undisclosed history of the Dutch governmental telex-message security 1945–19600
Multidimensional zero-correlation linear cryptanalysis on uBlock and RAIN0
Cryptanalysis and improvement of Q. Peng et al.’s PVSS scheme0
Efficient block masking for counting-based secret sharing0
Correction0
The Voynich manuscript: discussion of text creation hypotheses0
The “Topaze stick fragment”—a newly discovered rongorongo -inscribed artifact collected during the Rapa Nui (Easter Island) visit of HMS Topaze 0
Unicity distance of the Zodiac-340 cipher0
The Fiat-Shamir: zero(-knowledge) to signature in sixty minutes (of class time)0
Resource guide for teaching post-quantum cryptography0
The Naibbe cipher: a substitution cipher that encrypts Latin and Italian as Voynich Manuscript-like ciphertext0
Review of Queen of Codes: The Secret Life of Emily Anderson, Britain’s Greatest Female Codebreaker by Jackie Uí Chionna0
SPECK 32/64: in search of better rotation constants for neural differential distinguishers0
Deciphering Mary Stuart’s lost letters from 1578-15840
On computing the double point multiplication in elliptic curve cryptography0
Review of The Woman All Spies Fear by Amy Butler Greenfield and Code Breaker, Spy Hunter by Laurie Wallmark, Illustrated by Brooke Smart0
Multi-party key exchange scheme based on supertropical semiring0
Signature-based steganalysis of free steganography tools: classification and analysis of techniques0
An efficient practical alternative to ECC by Pell curve cryptography with a new vision0
Python simulation of the TSEC/KL-7 cipher machine0
Reconstructing the plug orders for intercepted Enigma Uhr messages0
An artificial neural network approach to finding the key length of the Vigenère cipher0
The origin of military cryptanalysis in Czechoslovakia0
Dorabella unMASCed – the Dorabella Cipher is not an English or Latin Mono-Alphabetical Substitution Cipher0
Meet-in-the-middle attacks on reduced round TweAES and NBC0
Review of No More Secrets: My Part in Codebreaking at Bletchley Park and the Pentagon by Betty WebbWebb, Betty. No More Secrets: My Part in codebreaking a0
T.R. Hollcroft’s Problem0
Review of The Enigma Affair by Charlie Lovett0
The Japanese Green Machine0
The classified mathematical papers of A. A. Albert: a glimpse into the application of mathematics to cryptologic problems during the 1950s and 1960s0
A statistical cryptanalysis of the Beale ciphers0
Review of Parker Hitt: The Father of American Military Cryptology by Betsy Rohaly Smoot0
Bletchley Park’s work on JN-250
Statistical tests suites analysis methods. Cryptographic recommendations0
0.078518867492676