Cryptologia最新文献

筛选
英文 中文
The classified mathematical papers of A. A. Albert: a glimpse into the application of mathematics to cryptologic problems during the 1950s and 1960s A. A. 阿尔伯特的分类数学论文:20 世纪 50 和 60 年代数学在密码问题中的应用一瞥
IF 0.6 4区 工程技术
Cryptologia Pub Date : 2024-09-19 DOI: 10.1080/01611194.2024.2398100
Roland Long
{"title":"The classified mathematical papers of A. A. Albert: a glimpse into the application of mathematics to cryptologic problems during the 1950s and 1960s","authors":"Roland Long","doi":"10.1080/01611194.2024.2398100","DOIUrl":"https://doi.org/10.1080/01611194.2024.2398100","url":null,"abstract":"Abraham Adrian Albert “A cubed” (1905–1972) was an algebraist best known academically for his study of associative and non-associative algebras. By the 1940s he had also developed an interest in cr...","PeriodicalId":55202,"journal":{"name":"Cryptologia","volume":"80 1","pages":""},"PeriodicalIF":0.6,"publicationDate":"2024-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142259230","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Review of The Hidden History of Code-Breaking and 50 Codes That Changed the World, both by Sinclair McKay 评论《密码破译的隐秘历史》和《改变世界的 50 个密码》,均由 Sinclair McKay 撰写
IF 0.6 4区 工程技术
Cryptologia Pub Date : 2024-09-13 DOI: 10.1080/01611194.2024.2396805
Chris Christensen
{"title":"Review of The Hidden History of Code-Breaking and 50 Codes That Changed the World, both by Sinclair McKay","authors":"Chris Christensen","doi":"10.1080/01611194.2024.2396805","DOIUrl":"https://doi.org/10.1080/01611194.2024.2396805","url":null,"abstract":"Published in Cryptologia (Ahead of Print, 2024)","PeriodicalId":55202,"journal":{"name":"Cryptologia","volume":"1 1","pages":""},"PeriodicalIF":0.6,"publicationDate":"2024-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142259232","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Condenser PBJ cipher machine 冷凝器 PBJ 密码机
IF 0.6 4区 工程技术
Cryptologia Pub Date : 2024-08-01 DOI: 10.1080/01611194.2024.2372254
Eugen Antal, Paul Reuvers, Pavol Zajac
{"title":"The Condenser PBJ cipher machine","authors":"Eugen Antal, Paul Reuvers, Pavol Zajac","doi":"10.1080/01611194.2024.2372254","DOIUrl":"https://doi.org/10.1080/01611194.2024.2372254","url":null,"abstract":"Condenser PBJ is a mechanical cipher machine developed by Pavel Baráček-Jacquier (1885-1969). It was created between 1922 and 1924, and was used by the Czechoslovak diplomatic service until 1934. T...","PeriodicalId":55202,"journal":{"name":"Cryptologia","volume":"41 1","pages":""},"PeriodicalIF":0.6,"publicationDate":"2024-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142222946","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The “Topaze stick fragment”—a newly discovered rongorongo-inscribed artifact collected during the Rapa Nui (Easter Island) visit of HMS Topaze in 1868 托帕兹木棍碎片"--1868 年 "托帕兹号 "访问拉帕努伊(复活节岛)时收集到的新发现的刻有隆戈隆戈文字的文物
IF 0.6 4区 工程技术
Cryptologia Pub Date : 2024-07-05 DOI: 10.1080/01611194.2024.2340478
Tomi S. Melka, Robert M. Schoch
{"title":"The “Topaze stick fragment”—a newly discovered rongorongo-inscribed artifact collected during the Rapa Nui (Easter Island) visit of HMS Topaze in 1868","authors":"Tomi S. Melka, Robert M. Schoch","doi":"10.1080/01611194.2024.2340478","DOIUrl":"https://doi.org/10.1080/01611194.2024.2340478","url":null,"abstract":"In this article, we document a small wooden relic from Rapa Nui (Easter Island) acquired by a crewmember of HMS Topaze during the ship’s visit to the island in 1868. Despite its otherwise unassumin...","PeriodicalId":55202,"journal":{"name":"Cryptologia","volume":"9 1","pages":""},"PeriodicalIF":0.6,"publicationDate":"2024-07-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141567459","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An artificial neural network approach to finding the key length of the Vigenère cipher 寻找维吉尼耶密码密钥长度的人工神经网络方法
IF 0.6 4区 工程技术
Cryptologia Pub Date : 2024-06-11 DOI: 10.1080/01611194.2024.2351117
Christian Millichap, Yeeka Yau
{"title":"An artificial neural network approach to finding the key length of the Vigenère cipher","authors":"Christian Millichap, Yeeka Yau","doi":"10.1080/01611194.2024.2351117","DOIUrl":"https://doi.org/10.1080/01611194.2024.2351117","url":null,"abstract":"In this article, we create an artificial neural network (ANN) that combines both classical and modern techniques for determining the key length of a Vigenère cipher. We provide experimental evidenc...","PeriodicalId":55202,"journal":{"name":"Cryptologia","volume":"6 1","pages":""},"PeriodicalIF":0.6,"publicationDate":"2024-06-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141506930","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fault-assisted side-channel analysis of HMAC-Streebog HMAC-Streebog 的故障辅助侧信道分析
IF 0.6 4区 工程技术
Cryptologia Pub Date : 2024-04-14 DOI: 10.1080/01611194.2024.2328548
Gautham Sekar, Mabin Joseph, R. Balasubramanian
{"title":"Fault-assisted side-channel analysis of HMAC-Streebog","authors":"Gautham Sekar, Mabin Joseph, R. Balasubramanian","doi":"10.1080/01611194.2024.2328548","DOIUrl":"https://doi.org/10.1080/01611194.2024.2328548","url":null,"abstract":"Streebog is a family of hash functions defined in the Russian cryptographic standard GOST R 34.11–2012. HMAC-Streebog, which is defined in RFC 7836, is a Streebog-based message authentication code....","PeriodicalId":55202,"journal":{"name":"Cryptologia","volume":"33 1","pages":""},"PeriodicalIF":0.6,"publicationDate":"2024-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140568218","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Square impossible differential attack and security of AES in known plaintext scenario 平方不可能差分攻击和已知明文情况下 AES 的安全性
IF 0.6 4区 工程技术
Cryptologia Pub Date : 2024-04-03 DOI: 10.1080/01611194.2024.2320362
Orhun Kara
{"title":"Square impossible differential attack and security of AES in known plaintext scenario","authors":"Orhun Kara","doi":"10.1080/01611194.2024.2320362","DOIUrl":"https://doi.org/10.1080/01611194.2024.2320362","url":null,"abstract":"In this work, we examine the security of the 8-round AES, under the known plaintext attack scenario, a type of cryptographic attack in which an attacker has access to the plaintext and correspondin...","PeriodicalId":55202,"journal":{"name":"Cryptologia","volume":"92 1","pages":""},"PeriodicalIF":0.6,"publicationDate":"2024-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140568228","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Evaluating GPT-4’s proficiency in addressing cryptography examinations 评估 GPT-4 处理密码学考试的能力
IF 0.6 4区 工程技术
Cryptologia Pub Date : 2024-03-23 DOI: 10.1080/01611194.2024.2320368
Vasily Mikhalev, Nils Kopal, Bernhard Esslinger
{"title":"Evaluating GPT-4’s proficiency in addressing cryptography examinations","authors":"Vasily Mikhalev, Nils Kopal, Bernhard Esslinger","doi":"10.1080/01611194.2024.2320368","DOIUrl":"https://doi.org/10.1080/01611194.2024.2320368","url":null,"abstract":"In the rapidly advancing domain of artificial intelligence, ChatGPT, powered by the GPT-4 model, has emerged as a state-of-the-art interactive agent, exhibiting substantial capabilities across vari...","PeriodicalId":55202,"journal":{"name":"Cryptologia","volume":"24 1","pages":""},"PeriodicalIF":0.6,"publicationDate":"2024-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140201924","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Review of Arctic Convoys by David Kenyon 大卫-凯尼恩的《北极车队》评论
IF 0.6 4区 工程技术
Cryptologia Pub Date : 2024-03-19 DOI: 10.1080/01611194.2024.2321963
Chris Christensen
{"title":"Review of Arctic Convoys by David Kenyon","authors":"Chris Christensen","doi":"10.1080/01611194.2024.2321963","DOIUrl":"https://doi.org/10.1080/01611194.2024.2321963","url":null,"abstract":"Published in Cryptologia (Ahead of Print, 2024)","PeriodicalId":55202,"journal":{"name":"Cryptologia","volume":"199 1","pages":""},"PeriodicalIF":0.6,"publicationDate":"2024-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140168081","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Immortal David Kahn 不朽的大卫-卡恩
IF 0.6 4区 工程技术
Cryptologia Pub Date : 2024-03-14 DOI: 10.1080/01611194.2024.2327725
{"title":"The Immortal David Kahn","authors":"","doi":"10.1080/01611194.2024.2327725","DOIUrl":"https://doi.org/10.1080/01611194.2024.2327725","url":null,"abstract":"Published in Cryptologia (Ahead of Print, 2024)","PeriodicalId":55202,"journal":{"name":"Cryptologia","volume":"116 1","pages":""},"PeriodicalIF":0.6,"publicationDate":"2024-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140151413","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信