- Chris Christensen:
Review of The Enigma Bulletin edited by Zdzisław J. Kapera. Cryptologia 44(6): 569-572 (2020) - Chris Christensen:
Review of Bletchley Park and D-Day by David Kenyon. Cryptologia 44(6): 573-576 (2020) - Nicolas T. Courtois
, Marios Georgiou:
Variable elimination strategies and construction of nonlinear polynomial invariant attacks on T-310. Cryptologia 44(1): 20-38 (2020) - Nicolas T. Courtois
, Aidan Patrick, Matteo Abbondati:
Construction of a polynomial invariant annihilation attack of degree 7 for T-310. Cryptologia 44(4): 289-314 (2020) - Alejandra Diaz
, Alan T. Sherman
, Anupam Joshi:
Phishing in an academic community: A study of user susceptibility and behavior. Cryptologia 44(1): 53-67 (2020) - John F. Dooley
:
Review of The Third Reich is Listening by Christian Jennings. Cryptologia 44(1): 91-95 (2020) - John F. Dooley
:
Review of the secret world by Christopher Andrew. Cryptologia 44(3): 280-284 (2020) - John F. Dooley
:
Review of A Most Enigmatic War by James Goodchild. Cryptologia 44(5): 477-480 (2020) - Anastasiya Gorodilova
, Sergey Agievich
, Claude Carlet
, Xiang-dong Hou, Valeriya Idrisova
, Nikolay Kolomeec
, Alexandr Kutsenko
, Luca Mariot
, Alexey Oblaukhov
, Stjepan Picek
, Bart Preneel
, Razvan Rosie, Natalia N. Tokareva
:
The Fifth International Students' Olympiad in cryptography - NSUCRYPTO: Problems and their solutions. Cryptologia 44(3): 223-256 (2020) - Robert J. Hanyok, Betsy Rohaly Smoot:
Sources and methods series: considering other record groups in Nara holding cryptologic and cryptologic-related records. Cryptologia 44(5): 472-476 (2020) - Robert J. Hanyok, Betsy Rohaly Smoot:
Sources and methods: contingency and its role in researching records of cryptologic history - a discussion and some lessons to apply for future research. Cryptologia 44(6): 560-568 (2020) - Thomas Kaeding:
Slippery hill-climbing technique for ciphertext-only cryptanalysis of periodic polyalphabetic substitution ciphers. Cryptologia 44(3): 205-222 (2020) - David Kenyon, Frode Weierud
:
Enigma G: The counter Enigma. Cryptologia 44(5): 385-420 (2020) - Shaheena Khatoon
, Balwant Singh Thakur:
Cryptanalysis and improvement of authentication scheme for roaming service in ubiquitous network. Cryptologia 44(4): 315-340 (2020) - Manoj Kumar
, T. S. Suresh
, Saibal K. Pal
, Anupama Panigrahi
:
Optimal differential trails in lightweight block ciphers ANU and PICO. Cryptologia 44(1): 68-78 (2020) - Jerry McCarthy:
Review of the 2nd International Conference on Historical Cryptology in Mons, Belgium. Cryptologia 44(3): 285-288 (2020) - Beáta Megyesi, Bernhard Esslinger, Alicia Fornés, Nils Kopal, Benedek Láng, George Lasry, Karl de Leeuw, Eva Pettersson, Arno Wacker, Michelle Waldispühl
:
Decryption of historical manuscripts: the DECRYPT project. Cryptologia 44(6): 545-559 (2020) - Tomi S. Melka, Robert M. Schoch:
Exploring a mysterious tablet from Easter Island: the issues of authenticity and falsifiability in rongorongo studies. Cryptologia 44(6): 481-544 (2020) - Lucas Boppre Niehues, Joachim von zur Gathen, Lucas Pandolfo Perin, Ana Zumalacárregui:
Sidon sets and statistics of the ElGamal function. Cryptologia 44(5): 438-450 (2020) - Prateek Pandey, Ratnesh Litoriya:
Securing and authenticating healthcare records through blockchain technology. Cryptologia 44(4): 341-356 (2020) - Seongmin Park, Juneyeun Kim, Kookrae Cho, Dae Hyun Yum:
Finding the key length of a Vigenère cipher: How to improve the twist algorithm. Cryptologia 44(3): 197-204 (2020) - Sarah Parsons:
Sources and methods for cryptologic history: NSA.gov - a tour through its history and resources. Cryptologia 44(4): 371-382 (2020) - Monjul Saikia
, Md. Anwar Hussain:
Efficient data encryption technique using quaternions for wireless sensor network. Cryptologia 44(5): 451-471 (2020) - David Sherman:
Sources and methods for cryptologic history: the William and Elizebeth Smith Friedman collections. Cryptologia 44(3): 267-279 (2020) - David Sherman, Betsy Rohaly Smoot, Robert J. Hanyok:
Introducing a new Cryptologia series: Sources and methods for cryptologic history. Cryptologia 44(1): 79-81 (2020) - Betsy Rohaly Smoot, Robert J. Hanyok:
Sources and methods for cryptologic history: Research at the US National Archives-the "Big Two" Record Groups. Cryptologia 44(2): 172-196 (2020) - Torsten Timm, Andreas Schinner:
A possible generating algorithm of the Voynich manuscript. Cryptologia 44(1): 1-19 (2020) - Frode Weierud
, Sandy Zabell:
German mathematicians and cryptology in WWII. Cryptologia 44(2): 97-171 (2020) - Review of two collections of essays about Alan Turing. Cryptologia 44(1): 82-86 (2020)
- Review of Real Life Cryptology by Benedek Láng. Cryptologia 44(1): 87-90 (2020)