Nils Kopal

According to our database1, Nils Kopal authored at least 39 papers between 2013 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Keys with nomenclatures in the early modern Europe.
Cryptologia, March, 2024

2023
Evaluating GPT-4's Proficiency in Addressing Cryptography Examinations.
IACR Cryptol. ePrint Arch., 2023

What is the Code for the Code? Historical Cryptology Terminology.
Proceedings of the 6th International Conference on Historical Cryptology, 2023

Historical Language Models in Cryptanalysis: Case Studies on English and German.
Proceedings of the 6th International Conference on Historical Cryptology, 2023

2022
Deciphering three diplomatic letters sent by Maximilian II in 1575.
Cryptologia, 2022

How we set new world records in breaking Playfair ciphertexts.
Cryptologia, 2022

What Was Encoded in Historical Cipher Keys in the Early Modern Era?
Proceedings of the 5th International Conference on Historical Cryptology, 2022

New Ciphers and Cryptanalysis Components in CrypTool 2.
Proceedings of the 5th International Conference on Historical Cryptology, 2022

Evaluating Deep Learning Techniques for Known-Plaintext Attacks on the Complete Columnar Transposition Cipher.
Proceedings of the 5th International Conference on Historical Cryptology, 2022

2021
Deciphering papal ciphers from the 16th to the 18th Century.
Cryptologia, 2021

A Massive Machine-Learning Approach For Classical Cipher Type Detection Using Feature Engineering.
Proceedings of the 4th International Conference on Historical Cryptology, 2021

Two Encrypted Diplomatic Letters Sent by Jan Chodkiewicz to Emperor Maximilian II in 1574-1575.
Proceedings of the 4th International Conference on Historical Cryptology, 2021

Island Ramanacoil a Bridge too Far. A Dutch Ciphertext from 1674.
Proceedings of the 4th International Conference on Historical Cryptology, 2021

Detection of Classical Cipher Types with Feature-Learning Approaches.
Proceedings of the Data Mining, 2021

2020
Decryption of historical manuscripts: the DECRYPT project.
Cryptologia, 2020

Of Ciphers and Neurons - Detecting the Type of Ciphers Using Artificial Neural Networks.
Proceedings of the 3rd International Conference on Historical Cryptology, 2020

2019
Cryptanalysis of Enigma double indicators with hill climbing.
Cryptologia, 2019

Cryptanalysis of Homophonic Substitution Ciphers Using Simulated Annealing with Fixed Temperature.
Proceedings of the 2nd International Conference on Historical Cryptology, 2019

2018
Secure Volunteer Computing for Distributed Cryptanalysis.
PhD thesis, 2018

Ciphertext-only cryptanalysis of short Hagelin M-209 ciphertexts.
Cryptologia, 2018

Solving Classical Ciphers with CrypTool 2.
Proceedings of the 1st International Conference on Historical Cryptology, 2018

A Decentralized Resilient Short-Term Cache for Messaging.
Proceedings of the Distributed Applications and Interoperable Systems, 2018

2017
Deciphering ADFGVX messages from the Eastern Front of World War I.
Cryptologia, 2017

Adaptive Cheat Detection in Decentralized Volunteer Computing with Untrusted Nodes.
Proceedings of the Distributed Applications and Interoperable Systems, 2017

2016
Cryptanalysis of Chaocipher and solution of Exhibit 6.
Cryptologia, 2016

Cryptanalysis of columnar transposition cipher with long keys.
Cryptologia, 2016

Ciphertext-only cryptanalysis of Hagelin M-209 pins and lugs.
Cryptologia, 2016

Automated Known-Plaintext Cryptanalysis of Short Hagelin M-209 Messages.
Cryptologia, 2016

Rational Unified Process.
CoRR, 2016

Volume Raycasting mit OpenCL.
CoRR, 2016

2015
"Löschen" im Internet.
Datenschutz und Datensicherheit, 2015

SoftGap: A Multi Independent Levels of Security Cross-Domain Solution.
Proceedings of the 3rd International Conference on Future Internet of Things and Cloud, 2015

Simulating Cheated Results Dissemination for Volunteer Computing.
Proceedings of the 3rd International Conference on Future Internet of Things and Cloud, 2015

A Novel Approach to Data Revocation on the Internet.
Proceedings of the Data Privacy Management, and Security Assurance, 2015

Analysis and monitoring of hidden TCP traffic based on an open-source covert timing channel.
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015

2014
CrypTool 2.0.
Datenschutz und Datensicherheit, 2014

Solving the Double Transposition Challenge with a Divide-and-Conquer Approach.
Cryptologia, 2014

Ranking Cryptographic Algorithms.
Proceedings of the Socio-technical Design of Ubiquitous Computing Systems, 2014

2013
A Concept for Securing Cyber-Physical Systems with Organic Computing Techniques.
Proceedings of the ARCS 2013, 2013


  Loading...