2025
Evaluating GPT-4's proficiency in addressing cryptography examinations.
Cryptologia, March, 2025
2024
Keys with nomenclatures in the early modern Europe.
Cryptologia, March, 2024
ICDAR 2024 Competition on Handwriting Recognition of Historical Ciphers.
Proceedings of the Document Analysis and Recognition - ICDAR 2024 - 18th International Conference, Athens, Greece, August 30, 2024
2023
What is the Code for the Code? Historical Cryptology Terminology.
Proceedings of the 6th International Conference on Historical Cryptology, 2023
Historical Language Models in Cryptanalysis: Case Studies on English and German.
Proceedings of the 6th International Conference on Historical Cryptology, 2023
2022
Deciphering three diplomatic letters sent by Maximilian II in 1575.
Cryptologia, 2022
How we set new world records in breaking Playfair ciphertexts.
Cryptologia, 2022
What Was Encoded in Historical Cipher Keys in the Early Modern Era?
Proceedings of the 5th International Conference on Historical Cryptology, 2022
New Ciphers and Cryptanalysis Components in CrypTool 2.
Proceedings of the 5th International Conference on Historical Cryptology, 2022
Evaluating Deep Learning Techniques for Known-Plaintext Attacks on the Complete Columnar Transposition Cipher.
Proceedings of the 5th International Conference on Historical Cryptology, 2022
2021
Deciphering papal ciphers from the 16th to the 18th Century.
Cryptologia, 2021
A Massive Machine-Learning Approach For Classical Cipher Type Detection Using Feature Engineering.
Proceedings of the 4th International Conference on Historical Cryptology, 2021
Two Encrypted Diplomatic Letters Sent by Jan Chodkiewicz to Emperor Maximilian II in 1574-1575.
Proceedings of the 4th International Conference on Historical Cryptology, 2021
Island Ramanacoil a Bridge too Far. A Dutch Ciphertext from 1674.
Proceedings of the 4th International Conference on Historical Cryptology, 2021
Detection of Classical Cipher Types with Feature-Learning Approaches.
Proceedings of the Data Mining, 2021
2020
Decryption of historical manuscripts: the DECRYPT project.
Cryptologia, 2020
Of Ciphers and Neurons - Detecting the Type of Ciphers Using Artificial Neural Networks.
Proceedings of the 3rd International Conference on Historical Cryptology, 2020
2019
Cryptanalysis of Enigma double indicators with hill climbing.
Cryptologia, 2019
Cryptanalysis of Homophonic Substitution Ciphers Using Simulated Annealing with Fixed Temperature.
Proceedings of the 2nd International Conference on Historical Cryptology, 2019
2018
Secure Volunteer Computing for Distributed Cryptanalysis.
PhD thesis, 2018
Ciphertext-only cryptanalysis of short Hagelin M-209 ciphertexts.
Cryptologia, 2018
Solving Classical Ciphers with CrypTool 2.
Proceedings of the 1st International Conference on Historical Cryptology, 2018
A Decentralized Resilient Short-Term Cache for Messaging.
Proceedings of the Distributed Applications and Interoperable Systems, 2018
2017
Deciphering ADFGVX messages from the Eastern Front of World War I.
Cryptologia, 2017
Adaptive Cheat Detection in Decentralized Volunteer Computing with Untrusted Nodes.
Proceedings of the Distributed Applications and Interoperable Systems, 2017
2016
Cryptanalysis of Chaocipher and solution of Exhibit 6.
Cryptologia, 2016
Cryptanalysis of columnar transposition cipher with long keys.
Cryptologia, 2016
Ciphertext-only cryptanalysis of Hagelin M-209 pins and lugs.
Cryptologia, 2016
Automated Known-Plaintext Cryptanalysis of Short Hagelin M-209 Messages.
Cryptologia, 2016
Rational Unified Process.
CoRR, 2016
Volume Raycasting mit OpenCL.
CoRR, 2016
2015
Datenschutz und Datensicherheit, 2015
SoftGap: A Multi Independent Levels of Security Cross-Domain Solution.
Proceedings of the 3rd International Conference on Future Internet of Things and Cloud, 2015
Simulating Cheated Results Dissemination for Volunteer Computing.
Proceedings of the 3rd International Conference on Future Internet of Things and Cloud, 2015
A Novel Approach to Data Revocation on the Internet.
Proceedings of the Data Privacy Management, and Security Assurance, 2015
Analysis and monitoring of hidden TCP traffic based on an open-source covert timing channel.
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015
2014
Datenschutz und Datensicherheit, 2014
Solving the Double Transposition Challenge with a Divide-and-Conquer Approach.
Cryptologia, 2014
Ranking Cryptographic Algorithms.
Proceedings of the Socio-technical Design of Ubiquitous Computing Systems, 2014
2013
A Concept for Securing Cyber-Physical Systems with Organic Computing Techniques.
Proceedings of the ARCS 2013, 2013