- Stuart Boersma:
Complete examples of encryption systems broken by Elizebeth Smith Friedman: 1923-1934. Cryptologia 47(5): 397-418 (2023) - Stuart Boersma, Jean Marie Linhart:
Review of The Woman All Spies Fear by Amy Butler Greenfield and Code Breaker, Spy Hunter by Laurie Wallmark, Illustrated by Brooke Smart. Cryptologia 47(1): 88-92 (2023) - Kenneth J. Bures:
Cracking PURPLE: the identification of homologs in the cryptanalysis of the Angooki Taipu B cipher machine. Cryptologia 47(5): 436-448 (2023) - Leonardo Campanelli:
A statistical cryptanalysis of the Beale ciphers. Cryptologia 47(5): 466-473 (2023) - Zhixiong Chen, Zhihua Niu, Yuqi Sang, Chenhuang Wu:
Arithmetic autocorrelation of binary m-sequences. Cryptologia 47(5): 449-458 (2023) - Chris Christensen:
Review of Codebreaker Girls: A Secret Life at Bletchley Park by Jan Slimming. Cryptologia 47(1): 93-96 (2023) - Chris Christensen:
Review of The Rohonc Code: Tracing a Historical Riddle by Benedek Láng. Cryptologia 47(3): 282-284 (2023) - Chris Christensen:
Genevieve Grotjan's "great discovery". Cryptologia 47(4): 302-317 (2023) - Chris Christensen:
Review of Parker Hitt: The Father of American Military Cryptology by Betsy Rohaly Smoot. Cryptologia 47(5): 489-492 (2023) - Chris Christensen:
Review of The Secret Life of an American Codebreaker: Codebreaker Girls by Jan SlimmingSlimming, Jan. The Secret Life of an American Codebreaker: Codebreaker Girls , South Yorkshire, England: Pen and Sword Books. 2022. 289 + xii pages, Hardcover, £25 ($34.95). ISBN 9781526784155. Cryptologia 47(6): 584-587 (2023) - David Løberg Code:
Can musical encryption be both? A survey of music-based ciphers. Cryptologia 47(4): 318-364 (2023) - John F. Dooley:
Review of The Rose Code by Kate Quinn. Cryptologia 47(4): 393-395 (2023) - Floe Foxon:
A treatise on the Rilke cryptogram. Cryptologia 47(6): 493-510 (2023) - Joachim von zur Gathen:
Unicity distance of the Zodiac-340 cipher. Cryptologia 47(5): 474-488 (2023) - Joshua Holden:
Resource guide for teaching post-quantum cryptography. Cryptologia 47(5): 459-465 (2023) - Satish Kumar, Indivar Gupta, Ashok Ji Gupta:
A study of public key cryptosystems based on quasigroups. Cryptologia 47(6): 511-540 (2023) - Arvind Kumar, P. R. Mishra, Odelu Ojjela:
Analysis of rotation and shift based diffusion functions. Cryptologia 47(5): 419-435 (2023) - Santosh Kumar Ravva, Sureddi R. M. Krishna:
Cryptanalysis of RSA with small difference of primes and two decryption exponents: Jochemsz and May approach. Cryptologia 47(6): 570-583 (2023) - George Lasry:
Cracking SIGABA in less than 24 hours on a consumer PC. Cryptologia 47(1): 1-37 (2023) - George Lasry:
Analysis of a late 19th century french cipher created by Major Josse. Cryptologia 47(1): 48-62 (2023) - George Lasry, Norbert Biermann, Satoshi Tomokiyo:
Deciphering Mary Stuart's lost letters from 1578-1584. Cryptologia 47(2): 101-202 (2023) - Olaf Ostwald, Frode Weierud:
Modern cryptanalysis of the Truppenschlüssel. Cryptologia 47(3): 261-281 (2023) - Paul W. Relkin:
Solving the Olum 2 cipher: a new approach to cryptanalysis of transposition ciphers. Cryptologia 47(1): 38-47 (2023) - David Sherman:
The Codebreakers war: David Kahn, Macmillan, the government, and the making of a cryptologic history masterpiece. Cryptologia 47(3): 205-226 (2023) - George Teseleanu:
Cryptographic symmetric structures based on quasigroups. Cryptologia 47(4): 365-392 (2023) - 2022
- Richard W. Bean, George Lasry, Frode Weierud:
Eavesdropping on the Biafra-Lisbon link - breaking historical ciphers from the Biafran war. Cryptologia 46(1): 1-66 (2022) - Sedat Bingöl:
Methods for encryption in early 19th-century Ottoman diplomatic correspondence. Cryptologia 46(6): 498-524 (2022) - Enka Blanchard, Ryan Robucci, Ted Selker, Alan T. Sherman:
Phrase-verified voting: Verifiable low-tech remote boardroom voting: How We Voted on Tenure & Promotion Cases during the Pandemic. Cryptologia 46(1): 67-101 (2022) - Jean-François Bouchaudy:
Enigma, the XYZ period (1939-1940). Cryptologia 46(3): 195-271 (2022)