default search action
Cryptologia, Volume 44
Volume 44, Number 1, 2020
Articles
- Torsten Timm, Andreas Schinner:
A possible generating algorithm of the Voynich manuscript. 1-19 - Nicolas T. Courtois, Marios Georgiou:
Variable elimination strategies and construction of nonlinear polynomial invariant attacks on T-310. 20-38 - Alejandra Diaz, Alan T. Sherman, Anupam Joshi:
Phishing in an academic community: A study of user susceptibility and behavior. 53-67 - Manoj Kumar, T. S. Suresh, Saibal K. Pal, Anupama Panigrahi:
Optimal differential trails in lightweight block ciphers ANU and PICO. 68-78 - David Sherman, Betsy Rohaly Smoot, Robert J. Hanyok:
Introducing a new Cryptologia series: Sources and methods for cryptologic history. 79-81
- Review of two collections of essays about Alan Turing. 82-86
- Review of Real Life Cryptology by Benedek Láng. 87-90
- John F. Dooley:
Review of The Third Reich is Listening by Christian Jennings. 91-95
Volume 44, Number 2, 2020
Original Articles
- Frode Weierud, Sandy Zabell:
German mathematicians and cryptology in WWII. 97-171 - Betsy Rohaly Smoot, Robert J. Hanyok:
Sources and methods for cryptologic history: Research at the US National Archives-the "Big Two" Record Groups. 172-196
Volume 44, Number 3, 2020
- Seongmin Park, Juneyeun Kim, Kookrae Cho, Dae Hyun Yum:
Finding the key length of a Vigenère cipher: How to improve the twist algorithm. 197-204 - Thomas Kaeding:
Slippery hill-climbing technique for ciphertext-only cryptanalysis of periodic polyalphabetic substitution ciphers. 205-222 - Anastasiya Gorodilova, Sergey Agievich, Claude Carlet, Xiang-dong Hou, Valeriya Idrisova, Nikolay Kolomeec, Alexandr Kutsenko, Luca Mariot, Alexey Oblaukhov, Stjepan Picek, Bart Preneel, Razvan Rosie, Natalia N. Tokareva:
The Fifth International Students' Olympiad in cryptography - NSUCRYPTO: Problems and their solutions. 223-256 - Cheryl L. Beaver, Stuart Boersma:
Celebrating ten years of KRYPTOS: a series of cryptanalysis. 257-266 - David Sherman:
Sources and methods for cryptologic history: the William and Elizebeth Smith Friedman collections. 267-279
- John F. Dooley:
Review of the secret world by Christopher Andrew. 280-284 - Jerry McCarthy:
Review of the 2nd International Conference on Historical Cryptology in Mons, Belgium. 285-288
Volume 44, Number 4, 2020
- Nicolas T. Courtois, Aidan Patrick, Matteo Abbondati:
Construction of a polynomial invariant annihilation attack of degree 7 for T-310. 289-314 - Shaheena Khatoon, Balwant Singh Thakur:
Cryptanalysis and improvement of authentication scheme for roaming service in ubiquitous network. 315-340 - Prateek Pandey, Ratnesh Litoriya:
Securing and authenticating healthcare records through blockchain technology. 341-356 - Anindya Kumar Biswas, Mou Dasgupta:
Two polynomials based (t, n) threshold secret sharing scheme with cheating detection. 357-370 - Sarah Parsons:
Sources and methods for cryptologic history: NSA.gov - a tour through its history and resources. 371-382
- Chris Christensen:
Review of code cracking for kids by Jean Daigneau. 383-384
Volume 44, Number 5, 2020
- David Kenyon, Frode Weierud:
Enigma G: The counter Enigma. 385-420 - Jonas Alin:
Principal component analysis of characters in the Voynich manuscript and their classifications based on comparative analysis of writings in known languages. 421-437 - Lucas Boppre Niehues, Joachim von zur Gathen, Lucas Pandolfo Perin, Ana Zumalacárregui:
Sidon sets and statistics of the ElGamal function. 438-450 - Monjul Saikia, Md. Anwar Hussain:
Efficient data encryption technique using quaternions for wireless sensor network. 451-471 - Robert J. Hanyok, Betsy Rohaly Smoot:
Sources and methods series: considering other record groups in Nara holding cryptologic and cryptologic-related records. 472-476
- John F. Dooley:
Review of A Most Enigmatic War by James Goodchild. 477-480
Volume 44, Number 6, 2020
- Tomi S. Melka, Robert M. Schoch:
Exploring a mysterious tablet from Easter Island: the issues of authenticity and falsifiability in rongorongo studies. 481-544 - Beáta Megyesi, Bernhard Esslinger, Alicia Fornés, Nils Kopal, Benedek Láng, George Lasry, Karl de Leeuw, Eva Pettersson, Arno Wacker, Michelle Waldispühl:
Decryption of historical manuscripts: the DECRYPT project. 545-559 - Robert J. Hanyok, Betsy Rohaly Smoot:
Sources and methods: contingency and its role in researching records of cryptologic history - a discussion and some lessons to apply for future research. 560-568
- Chris Christensen:
Review of The Enigma Bulletin edited by Zdzisław J. Kapera. 569-572 - Chris Christensen:
Review of Bletchley Park and D-Day by David Kenyon. 573-576
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.