


default search action
Cryptologia, Volume 44
Volume 44, Number 1, 2020
Articles
- Torsten Timm, Andreas Schinner:

A possible generating algorithm of the Voynich manuscript. 1-19 - Nicolas T. Courtois

, Marios Georgiou:
Variable elimination strategies and construction of nonlinear polynomial invariant attacks on T-310. 20-38 - Alejandra Diaz

, Alan T. Sherman
, Anupam Joshi:
Phishing in an academic community: A study of user susceptibility and behavior. 53-67 - Manoj Kumar

, T. S. Suresh
, Saibal K. Pal
, Anupama Panigrahi
:
Optimal differential trails in lightweight block ciphers ANU and PICO. 68-78 - David Sherman, Betsy Rohaly Smoot, Robert J. Hanyok:

Introducing a new Cryptologia series: Sources and methods for cryptologic history. 79-81
- Review of two collections of essays about Alan Turing. 82-86

- Review of Real Life Cryptology by Benedek Láng. 87-90

- John F. Dooley

:
Review of The Third Reich is Listening by Christian Jennings. 91-95
Volume 44, Number 2, 2020
Original Articles
- Frode Weierud

, Sandy Zabell:
German mathematicians and cryptology in WWII. 97-171 - Betsy Rohaly Smoot, Robert J. Hanyok:

Sources and methods for cryptologic history: Research at the US National Archives-the "Big Two" Record Groups. 172-196
Volume 44, Number 3, 2020
- Seongmin Park, Juneyeun Kim, Kookrae Cho, Dae Hyun Yum:

Finding the key length of a Vigenère cipher: How to improve the twist algorithm. 197-204 - Thomas Kaeding:

Slippery hill-climbing technique for ciphertext-only cryptanalysis of periodic polyalphabetic substitution ciphers. 205-222 - Anastasiya Gorodilova

, Sergey Agievich
, Claude Carlet
, Xiang-dong Hou, Valeriya Idrisova
, Nikolay Kolomeec
, Alexandr Kutsenko
, Luca Mariot
, Alexey Oblaukhov
, Stjepan Picek
, Bart Preneel
, Razvan Rosie, Natalia N. Tokareva
:
The Fifth International Students' Olympiad in cryptography - NSUCRYPTO: Problems and their solutions. 223-256 - Cheryl L. Beaver, Stuart Boersma:

Celebrating ten years of KRYPTOS: a series of cryptanalysis. 257-266 - David Sherman:

Sources and methods for cryptologic history: the William and Elizebeth Smith Friedman collections. 267-279
- John F. Dooley

:
Review of the secret world by Christopher Andrew. 280-284 - Jerry McCarthy:

Review of the 2nd International Conference on Historical Cryptology in Mons, Belgium. 285-288
Volume 44, Number 4, 2020
- Nicolas T. Courtois

, Aidan Patrick, Matteo Abbondati:
Construction of a polynomial invariant annihilation attack of degree 7 for T-310. 289-314 - Shaheena Khatoon

, Balwant Singh Thakur:
Cryptanalysis and improvement of authentication scheme for roaming service in ubiquitous network. 315-340 - Prateek Pandey, Ratnesh Litoriya:

Securing and authenticating healthcare records through blockchain technology. 341-356 - Anindya Kumar Biswas

, Mou Dasgupta:
Two polynomials based (t, n) threshold secret sharing scheme with cheating detection. 357-370 - Sarah Parsons:

Sources and methods for cryptologic history: NSA.gov - a tour through its history and resources. 371-382
- Chris Christensen:

Review of code cracking for kids by Jean Daigneau. 383-384
Volume 44, Number 5, 2020
- David Kenyon, Frode Weierud

:
Enigma G: The counter Enigma. 385-420 - Jonas Alin

:
Principal component analysis of characters in the Voynich manuscript and their classifications based on comparative analysis of writings in known languages. 421-437 - Lucas Boppre Niehues, Joachim von zur Gathen, Lucas Pandolfo Perin, Ana Zumalacárregui:

Sidon sets and statistics of the ElGamal function. 438-450 - Monjul Saikia

, Md. Anwar Hussain:
Efficient data encryption technique using quaternions for wireless sensor network. 451-471 - Robert J. Hanyok, Betsy Rohaly Smoot:

Sources and methods series: considering other record groups in Nara holding cryptologic and cryptologic-related records. 472-476
- John F. Dooley

:
Review of A Most Enigmatic War by James Goodchild. 477-480
Volume 44, Number 6, 2020
- Tomi S. Melka, Robert M. Schoch:

Exploring a mysterious tablet from Easter Island: the issues of authenticity and falsifiability in rongorongo studies. 481-544 - Beáta Megyesi, Bernhard Esslinger, Alicia Fornés, Nils Kopal, Benedek Láng, George Lasry, Karl de Leeuw, Eva Pettersson, Arno Wacker, Michelle Waldispühl

:
Decryption of historical manuscripts: the DECRYPT project. 545-559 - Robert J. Hanyok, Betsy Rohaly Smoot:

Sources and methods: contingency and its role in researching records of cryptologic history - a discussion and some lessons to apply for future research. 560-568
- Chris Christensen:

Review of The Enigma Bulletin edited by Zdzisław J. Kapera. 569-572 - Chris Christensen:

Review of Bletchley Park and D-Day by David Kenyon. 573-576

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














