Decryption of historical manuscripts: the DECRYPT project B Megyesi, B Esslinger, A Fornés, N Kopal, B Láng, G Lasry, K Leeuw, ... Cryptologia 44 (6), 545-559, 2020 | 49 | 2020 |
Solving Classical Ciphers with CrypTool 2. N Kopal HistoCrypt, 149:010, 2018 | 22 | 2018 |
Solving the double transposition challenge with a divide-and-conquer approach G Lasry, N Kopal, A Wacker Cryptologia 38 (3), 197-214, 2014 | 22 | 2014 |
Deciphering papal ciphers from the 16th to the 18th Century G Lasry, B Megyesi, N Kopal Cryptologia 45 (6), 479-540, 2021 | 21 | 2021 |
Cryptanalysis of columnar transposition cipher with long keys G Lasry, N Kopal, A Wacker Cryptologia 40 (4), 374-398, 2016 | 20 | 2016 |
Deciphering ADFGVX messages from the eastern front of world war I G Lasry, I Niebel, N Kopal, A Wacker Cryptologia 41 (2), 101-136, 2017 | 18 | 2017 |
CrypTool 2.0: Open-Source Kryptologie für Jedermann N Kopal, O Kieselmann, A Wacker, B Esslinger Datenschutz und Datensicherheit-DuD 38 (10), 701-708, 2014 | 18 | 2014 |
A concept for securing cyber-physical systems with organic computing techniques J Hähner, S Rudolph, S Tomforde, D Fisch, B Sick, N Kopal, A Wacker 26th International Conference on Architecture of Computing Systems 2013, 1-13, 2013 | 18 | 2013 |
Of Ciphers and Neurons-Detecting the Type of Ciphers Using Artificial Neural Networks. N Kopal HistoCrypt, 77-86, 2020 | 15 | 2020 |
Detection of classical cipher types with feature-learning approaches E Leierzopf, V Mikhalev, N Kopal, B Esslinger, H Lampesberger, ... Data Mining: 19th Australasian Conference on Data Mining, AusDM 2021 …, 2021 | 13 | 2021 |
Cryptanalysis of homophonic substitution ciphers using simulated annealing with fixed temperature N Kopal Proceedings of the 2nd International Conference on Historical Cryptology …, 2019 | 12 | 2019 |
A massive machine-learning approach for classical cipher type detection using feature engineering E Leierzopf, N Kopal, B Esslinger, H Lampesberger, E Hermann International conference on historical cryptology, 111-120, 2021 | 11 | 2021 |
Analysis and monitoring of hidden TCP traffic based on an open-source covert timing channel A Liguori, F Benedetto, G Giunta, N Kopal, A Wacker 2015 IEEE conference on communications and network security (CNS), 667-674, 2015 | 10 | 2015 |
Automated known-plaintext cryptanalysis of short Hagelin M-209 messages G Lasry, N Kopal, A Wacker Cryptologia 40 (1), 49-69, 2016 | 8 | 2016 |
„Löschen “im Internet: Ein neuer Ansatz für die technische Unterstützung des Rechts auf Löschen O Kieselmann, N Kopal, A Wacker Datenschutz und Datensicherheit-DuD 39, 31-36, 2015 | 8 | 2015 |
Deciphering three diplomatic letters sent by Maximilian II in 1575 N Kopal, M Waldispühl Cryptologia 46 (2), 103-127, 2022 | 7 | 2022 |
Rational Unified Process N Kopal arXiv preprint arXiv:1609.07350, 2016 | 7 | 2016 |
Keys with nomenclatures in the early modern Europe B Megyesi, C Tudor, B Láng, A Lehofer, N Kopal, K de Leeuw, ... Cryptologia 48 (2), 97-139, 2024 | 6 | 2024 |
Island Ramanacoil a Bridge too Far. A Dutch Ciphertext from 1674 J Dinnissen, N Kopal International Conference on Historical Cryptology, 48-57, 2021 | 6 | 2021 |
Secure volunteer computing for distributed cryptanalysis N Kopal kassel university press GmbH, 2018 | 6 | 2018 |