default search action
George Lasry
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c11]Alicia Fornés, Jialuo Chen, Pau Torras, Carles Badal, Beáta Megyesi, Michelle Waldispühl, Nils Kopal, George Lasry:
ICDAR 2024 Competition on Handwriting Recognition of Historical Ciphers. ICDAR (6) 2024: 332-344 - 2023
- [j16]George Lasry:
Cracking SIGABA in less than 24 hours on a consumer PC. Cryptologia 47(1): 1-37 (2023) - [j15]George Lasry:
Analysis of a late 19th century french cipher created by Major Josse. Cryptologia 47(1): 48-62 (2023) - [j14]George Lasry, Norbert Biermann, Satoshi Tomokiyo:
Deciphering Mary Stuart's lost letters from 1578-1584. Cryptologia 47(2): 101-202 (2023) - [c10]George Lasry:
Armand de Bourbon's Poly-Homophonic Cipher - 1649. HistoCrypt 2023: 105-112 - 2022
- [j13]Richard W. Bean, George Lasry, Frode Weierud:
Eavesdropping on the Biafra-Lisbon link - breaking historical ciphers from the Biafran war. Cryptologia 46(1): 1-66 (2022) - [j12]Elonka Dunin, Magnus Ekhall, Konstantin Hamidullin, Nils Kopal, George Lasry, Klaus Schmeh:
How we set new world records in breaking Playfair ciphertexts. Cryptologia 46(4): 302-322 (2022) - [c9]George Lasry, Paolo Bonavoglia:
Deciphering a Short Papal Cipher from 1721. HistoCrypt 2022: 142-146 - [c8]George Lasry:
Deciphering a Letter from the French Wars of Religion. HistoCrypt 2022: 147-152 - 2021
- [j11]George Lasry, Ingo Niebel, Torbjörn Andersson:
Deciphering German diplomatic and naval attaché messages from 1900-1915. Cryptologia 45(5): 383-425 (2021) - [j10]George Lasry, Beáta Megyesi, Nils Kopal:
Deciphering papal ciphers from the 16th to the 18th Century. Cryptologia 45(6): 479-540 (2021) - [c7]George Lasry:
Deciphering a Letter to Louis XIV from his Ambassador to the Dutch Republic, le Comte d'Avaux, 1684. HistoCrypt 2021: 94-100 - [c6]George Lasry:
Modern Cryptanalysis of Schlüsselgerät 41. HistoCrypt 2021: 101-110 - 2020
- [j9]Beáta Megyesi, Bernhard Esslinger, Alicia Fornés, Nils Kopal, Benedek Láng, George Lasry, Karl de Leeuw, Eva Pettersson, Arno Wacker, Michelle Waldispühl:
Decryption of historical manuscripts: the DECRYPT project. Cryptologia 44(6): 545-559 (2020) - [c5]George Lasry:
Solving a Tunny Challenge with Computerized "Testery" Methods. HistoCrypt 2020: 96-105
2010 – 2019
- 2019
- [j8]George Lasry, Nils Kopal, Arno Wacker:
Cryptanalysis of Enigma double indicators with hill climbing. Cryptologia 43(4): 267-292 (2019) - [c4]George Lasry:
A Practical Meet-in-the-Middle Attack on SIGABA. HistoCrypt 2019: 158:005 - [c3]George Lasry:
Solving a 40-Letter Playfair Challenge with CrypTool 2. HistoCrypt 2019: 158:010 - 2018
- [b1]George Lasry:
A Methodology for the Cryptanalysis of Classical Ciphers with Search Metaheuristics. University of Kassel, Germany, 2018, ISBN 978-3-7376-0458-1, pp. 1-227 - [j7]George Lasry, Nils Kopal, Arno Wacker:
Ciphertext-only cryptanalysis of short Hagelin M-209 ciphertexts. Cryptologia 42(6): 485-513 (2018) - [c2]George Lasry:
Invited Talk - Special Session on Arne Beurling: Modern Codebreaking of T52. HistoCrypt 2018: 149:006 - [c1]George Lasry:
Deciphering German Diplomatic and Naval Attaché Messages from 1914-1915. HistoCrypt 2018: 149:013 - 2017
- [j6]George Lasry, Ingo Niebel, Nils Kopal, Arno Wacker:
Deciphering ADFGVX messages from the Eastern Front of World War I. Cryptologia 41(2): 101-136 (2017) - 2016
- [j5]George Lasry, Nils Kopal, Arno Wacker:
Automated Known-Plaintext Cryptanalysis of Short Hagelin M-209 Messages. Cryptologia 40(1): 49-69 (2016) - [j4]George Lasry, Nils Kopal, Arno Wacker:
Ciphertext-only cryptanalysis of Hagelin M-209 pins and lugs. Cryptologia 40(2): 141-176 (2016) - [j3]George Lasry, Nils Kopal, Arno Wacker:
Cryptanalysis of columnar transposition cipher with long keys. Cryptologia 40(4): 374-398 (2016) - [j2]George Lasry, Moshe Rubin, Nils Kopal, Arno Wacker:
Cryptanalysis of Chaocipher and solution of Exhibit 6. Cryptologia 40(6): 487-514 (2016) - 2014
- [j1]George Lasry, Nils Kopal, Arno Wacker:
Solving the Double Transposition Challenge with a Divide-and-Conquer Approach. Cryptologia 38(3): 197-214 (2014)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-04 20:01 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint