5,254
Views
12
CrossRef citations to date
0
Altmetric
Original Articles

Decryption of historical manuscripts: the DECRYPT project

, , , , , , , , & show all

References

  • Baró, A., J. Chen, A. Fornés, and B. Megyesi. 2019. Towards a generic unsupervised method for transcription of encoded manuscripts. Paper presented at the 3rd International Conference on Digital Access to Textual Cultural Heritage (DATECH). doi:10.1145/3322905.3322920.
  • Bauer, F. 2007. Decrypted secrets — Methods and maxims of cryptology, 4th ed. Berlin, Heidelberg: Springer.
  • Bonavoglia, P., and C. Pellegrino. 2016. The last poem of Pietro Giannoneâ — finally decrypted. Cryptologia 40 (5):411–27. doi:10.1080/01611194.2015.1087072.
  • CrypTool. 2020. The CrypTool project develops the world’s most-widespread free e-learning programs in the area of cryptography and cryptanalysis. Accessed October 21, 2019. http://www.cryptool.org.
  • DECRYPT. 2020. The DECRYPT website contains resources and tools for historical cryptology, developed in two projects financed by the Swedish Research Council: The DECODE project (Automatic Decoding of Historical Manuscripts, 2015-2017) and the DECRYPT project (Decryption of Historical Manuscripts, 2019-2024). Accessed October 21, 2019. https://cl.lingfil.uu.se/decode/.
  • Fornés, A., B. Megyesi, and J. Mas. 2017. Transcription of encoded manuscripts with image processing techniques. In Digital humanities. New York, NY: Scribner.
  • Hick, S., B. Esslinger, and A. Wacker. 2012. Reducing the complexity of understanding cryptology using CrypTool. Paper presented at the 10th International Conference on Education and Information Systems, Technologies and Applications (EISTA 2012), Orlando, Florida, USA.
  • HistCorp. 2018. HistCorp is an open-source collection of historical texts and language models for 14 European languages. Accessed October 21, 2019. https://cl.lingfil.uu.se/histcorp/.
  • Kahn, D. 1996. The codebreakers: The comprehensive history of secret communication from ancient times to the internet. New York.
  • Kopal, N. 2019. Cryptanalysis of homophonic substitution ciphers using simulated annealing with fixed temperature. Paper presented at the Proceedings of the 2nd International Conference on Historical Cryptology, HistoCrypt 2019, 107–16, Mons, Belgium: Linköping University Electronic Press, June 23–26.
  • Kopal, N., O. Kieselmann, A. Wacker, and B. Esslinger. 2014. CrypTool 2.0. Open-Source Kryptologie für Jedermann. In Datenschutz und Datensicherheit (DuD) 5/2014.
  • Lasry, G., I. Niebel, N. Kopal, and A. Wacker. 2017. Deciphering ADFGVX messages from World War I Eastern Front. Cryptologia 41 (2):101–36. doi:10.1080/01611194.2016.1169461.
  • Láng, B. 2015. Shame, love, and alcohol: Private ciphers in early modern Hungary. Cryptologia 39 (3):276–87. doi:10.1080/01611194.2014.915270.
  • Megyesi, B., N. Blomqvist, and E. Pettersson. 2019. The DECODE database: Collection of ciphers and keys. Paper presented at the Proceedings of the 2nd International Conference on Historical Cryptology, HistoCrypt19, Mons, Belgium, June.
  • MysteryTwister C3. 2009–2020. MysteryTwister C3 (MTC3) is an international cryptography competition, offering more than 200 riddles (challenges) at four levels of difficulty. Accessed October 21, 2019. https://www.mysterytwisterc3.org.
  • Patarin, J., and V. Nachef. 2010. I shall love you until death” (Marie-Antoinette to Axel von Fersen). Cryptologia 34 (2):104–14. doi:10.1080/01611191003621212.
  • Pettersson, E., and B. Megyesi. 2018. The HistCorp collection of historical corpora and resources. Paper presented at the Proceedings of the Digital Humanities in the Nordic Countries 3rd Conference, Helsinki, Finland, March.
  • Pettersson, E., and B. Megyesi. 2019. Matching keys and encrypted manuscript. Paper presented at the Proceedings of the 22nd Nordic Conference on Computational Linguistics, 253–61, Turku, Finland: Linköping University Electronic Press, September 30–October 2.
  • Schmeh, K. 2015. Encrypted books: Mysteries that fill hundreds of pages. Cryptologia 39 (4):342–61. doi:10.1080/01611194.2014.988369.
  • Singh, S. 2000. The code book: The science of secrecy from ancient Egypt to quantum cryptography. Anchor Books.
  • Strasser, G. F. 2012. Late 18th-century French encrypted diplomatic “Letters of Recommendation” — or, how to unwittingly carry your own warrant. Cryptologia 36 (3):230–9. doi:10.1080/01611194.2012.688694.
  • Yin, X., N. Aldarrab, B. Megyesi, and K. Knight. 2019. Decipherment of historical manuscript images. Paper presented at the Proceedings of ICDAR.