Cryptologia

Papers
(The TQCC of Cryptologia is 1. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-06-01 to 2025-06-01.)
ArticleCitations
Review of Enigma Traitors by Dermot Turing13
Keys with nomenclatures in the early modern Europe6
Expanded low-rank parity-check codes and their application to cryptography6
Review of From the Ground Up by Betsy Rohaly SmootSmoot, Betsy Rohaly. 2023. From the Ground Up: American Cryptology during World War I . 5
Review of Rongorongo : Inscribed Objects from Rapa Nui Paul Horley. Rongorongo: Inscribed Objects from Rapa Nui 4
Review of 100 People You Never Knew Were at Bletchley Park by Sinclair McKayMcKay, Sinclair. 100 People You Never Knew Were at Bletchley Park 3
Review of Before Bletchley Park: The Codebreakers of the First World War by Paul Gannon3
Accelerating pairings on BW10 and BW14 curves2
Review of Backing Bletchley: The Codebreaking Outstations from Eastcote to GCHQ by Ronald Koorm2
Review of the second edition of Craig Bauer’s “ Secret History: The Story of Cryptology, Second Edition2
On security aspects of the ciphers T-310 and SKS with approved long-term keys2
Cracking PURPLE: the identification of homologs in the cryptanalysis of the Angooki Taipu B cipher machine2
The Voynich Manuscript was written in a single, natural language2
Cracking SIGABA in less than 24 hours on a consumer PC2
An ultra-lightweight block cipher with string transformations1
Review of codebreaker by Marc McMenamin1
The influence of Bletchley Park on UK mathematics1
Review of Madame X: The Story of ‘003’, the U.S. Army Cryptologic Bombe in World War II by Michael Barbakoff1
Shadow IT in higher education: survey and case study for cybersecurity1
Review of Crypto Wars—The Fight for Privacy in the Digital Age: A Political History of Digital Encryption1
Decentralized universally verifiable stake voting system with perfect privacy1
Arithmetic autocorrelation of binary m-sequences1
Elizebeth Smith Friedman’s recovery of the wiring of two rotors from an enigma D machine1
Review of The Rose Code by Kate Quinn1
The Codebreakers war: David Kahn, Macmillan, the government, and the making of a cryptologic history masterpiece1
Multiple impossible differential cryptanalysis of reduced-round NBC1
Enumerating security analysis of NTRU cryptosystem1
The new golden age of decipherment1
A treatise on the Rilke cryptogram1
Cryptologic History Symposium, May 8–10, 20241
Multi-party key exchange scheme based on supertropical semiring1
The first Czechoslovak cipher machine1
Review of The Hidden History of Code-Breaking and 50 Codes That Changed the World , both by Sinclair McKay1
Review of Radio War: The Secret Espionage War of the Radio Security Service 1938–1946 by David Abrutat1
Cryptanalysis of RSA with small difference of primes and two decryption exponents: Jochemsz and May approach1
Square impossible differential attack and security of AES in known plaintext scenario1
Differential cryptanalysis of the lightweight block cipher LELBC1
The changes in Ottoman diplomatic cryptography and its methods during the 19th century (1811–1877)1
0.064859867095947