Cryptologia

Papers
(The TQCC of Cryptologia is 1. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-04-01 to 2025-04-01.)
ArticleCitations
The ciphers of the Republic of Venice an overview12
Review of Crypto Wars—The Fight for Privacy in the Digital Age: A Political History of Digital Encryption6
A treatise on the Rilke cryptogram4
Review of The Secret Life of an American Codebreaker: Codebreaker Girls by Jan SlimmingSlimming, Jan. The Secret Life of an American Codebreaker: Codebrea4
The new golden age of decipherment4
An efficient practical alternative to ECC by Pell curve cryptography with a new vision4
Review of The Rose Code by Kate Quinn3
Rudyard Kipling’s unsolved cryptogram3
Review of No More Secrets: My Part in Codebreaking at Bletchley Park and the Pentagon by Betty WebbWebb, Betty. No More Secrets: My Part in codebreaking a2
Sources and methods: Searching for cryptologic records in the findings of post-World War II allied technical surveys and commissions2
Review of Eavesdropping on the Emperor: Interrogators and Codebreakers in Britain’s War with Japan by Peter Kornicki2
Review of The Enigma Affair by Charlie Lovett2
The first Czechoslovak cipher machine2
Resource guide for teaching post-quantum cryptography1
The Codebreakers war: David Kahn, Macmillan, the government, and the making of a cryptologic history masterpiece1
An artificial neural network approach to finding the key length of the Vigenère cipher1
Review of Queen of Codes: The Secret Life of Emily Anderson, Britain’s Greatest Female Codebreaker by Jackie Uí Chionna1
An improved cryptanalysis of multi-prime RSA with specific forms of decryption exponent1
Review of The linguistics of the Voynich manuscript by Claire Bowern and Luke Lindemann1
Review of The Real Special Relationship by Michael Smith1
Leo Marks’ “mental one-time pad”: an experimental cipher for British special operations in World War II1
Modern cryptanalysis of the Truppenschlüssel1
Compression, correction, confidentiality, and comprehension: a modern look at telegraph codebooks1
Shadow IT in higher education: survey and case study for cybersecurity1
Fault-assisted side-channel analysis of HMAC-Streebog1
Cryptanalysis of RSA with small difference of primes and two decryption exponents: Jochemsz and May approach1
Review of Radio War: The Secret Espionage War of the Radio Security Service 1938–1946 by David Abrutat1
Review of Codebreaker Girls: A Secret Life at Bletchley Park by Jan Slimming1
Statistical tests suites analysis methods. Cryptographic recommendations1
Review of The Woman All Spies Fear by Amy Butler Greenfield and Code Breaker, Spy Hunter by Laurie Wallmark, Illustrated by Brooke Smart1
Deciphering Mary Stuart’s lost letters from 1578-15841
Review of Enigma Traitors by Dermot Turing1
FCSR connection integers: efficient generation, testing and counting1
0.092338085174561