default search action
Nils Kopal
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j15]Beáta Megyesi, Crina Tudor, Benedek Láng, Anna Lehofer, Nils Kopal, Karl de Leeuw, Michelle Waldispühl:
Keys with nomenclatures in the early modern Europe. Cryptologia 48(2): 97-139 (2024) - [c20]Alicia Fornés, Jialuo Chen, Pau Torras, Carles Badal, Beáta Megyesi, Michelle Waldispühl, Nils Kopal, George Lasry:
ICDAR 2024 Competition on Handwriting Recognition of Historical Ciphers. ICDAR (6) 2024: 332-344 - 2023
- [c19]Beáta Megyesi, Justyna Sikora, Filip Fornmark, Michelle Waldispühl, Nils Kopal, Vasily Mikhalev:
Historical Language Models in Cryptanalysis: Case Studies on English and German. HistoCrypt 2023: 120-129 - [c18]Vasily Mikhalev, Nils Kopal, Bernhard Esslinger, Michelle Waldispühl, Benedek Láng, Beáta Megyesi:
What is the Code for the Code? Historical Cryptology Terminology. HistoCrypt 2023: 130-138 - [i3]Vasily Mikhalev, Nils Kopal, Bernhard Esslinger:
Evaluating GPT-4's Proficiency in Addressing Cryptography Examinations. IACR Cryptol. ePrint Arch. 2023: 1551 (2023) - 2022
- [j14]Nils Kopal, Michelle Waldispühl:
Deciphering three diplomatic letters sent by Maximilian II in 1575. Cryptologia 46(2): 103-127 (2022) - [j13]Elonka Dunin, Magnus Ekhall, Konstantin Hamidullin, Nils Kopal, George Lasry, Klaus Schmeh:
How we set new world records in breaking Playfair ciphertexts. Cryptologia 46(4): 302-322 (2022) - [c17]Nino Fürthauer, Vasily Mikhalev, Nils Kopal, Bernhard Esslinger, Harald Lampesberger, Eckehard Hermann:
Evaluating Deep Learning Techniques for Known-Plaintext Attacks on the Complete Columnar Transposition Cipher. HistoCrypt 2022: 82-90 - [c16]Nils Kopal, Bernhard Esslinger:
New Ciphers and Cryptanalysis Components in CrypTool 2. HistoCrypt 2022: 127-136 - [c15]Beáta Megyesi, Crina Tudor, Benedek Láng, Anna Lehofer, Nils Kopal, Michelle Waldispühl:
What Was Encoded in Historical Cipher Keys in the Early Modern Era? HistoCrypt 2022: 159-167 - 2021
- [j12]George Lasry, Beáta Megyesi, Nils Kopal:
Deciphering papal ciphers from the 16th to the 18th Century. Cryptologia 45(6): 479-540 (2021) - [c14]Ernst Leierzopf, Vasily Mikhalev, Nils Kopal, Bernhard Esslinger, Harald Lampesberger, Eckehard Hermann:
Detection of Classical Cipher Types with Feature-Learning Approaches. AusDM 2021: 152-164 - [c13]Jörgen Dinnissen, Nils Kopal:
Island Ramanacoil a Bridge too Far. A Dutch Ciphertext from 1674. HistoCrypt 2021: 48-57 - [c12]Nils Kopal, Michelle Waldispühl:
Two Encrypted Diplomatic Letters Sent by Jan Chodkiewicz to Emperor Maximilian II in 1574-1575. HistoCrypt 2021: 80-89 - [c11]Ernst Leierzopf, Nils Kopal, Bernhard Esslinger, Harald Lampesberger, Eckehard Hermann:
A Massive Machine-Learning Approach For Classical Cipher Type Detection Using Feature Engineering. HistoCrypt 2021: 111-120 - 2020
- [j11]Beáta Megyesi, Bernhard Esslinger, Alicia Fornés, Nils Kopal, Benedek Láng, George Lasry, Karl de Leeuw, Eva Pettersson, Arno Wacker, Michelle Waldispühl:
Decryption of historical manuscripts: the DECRYPT project. Cryptologia 44(6): 545-559 (2020) - [c10]Nils Kopal:
Of Ciphers and Neurons - Detecting the Type of Ciphers Using Artificial Neural Networks. HistoCrypt 2020: 77-86
2010 – 2019
- 2019
- [j10]George Lasry, Nils Kopal, Arno Wacker:
Cryptanalysis of Enigma double indicators with hill climbing. Cryptologia 43(4): 267-292 (2019) - [c9]Nils Kopal:
Cryptanalysis of Homophonic Substitution Ciphers Using Simulated Annealing with Fixed Temperature. HistoCrypt 2019: 158:012 - 2018
- [b1]Nils Kopal:
Secure Volunteer Computing for Distributed Cryptanalysis. University of Kassel, Germany, 2018, ISBN 978-3-7376-0426-0, pp. 1-239 - [j9]George Lasry, Nils Kopal, Arno Wacker:
Ciphertext-only cryptanalysis of short Hagelin M-209 ciphertexts. Cryptologia 42(6): 485-513 (2018) - [c8]Henner Heck, Olga Kieselmann, Nils Kopal, Arno Wacker:
A Decentralized Resilient Short-Term Cache for Messaging. DAIS 2018: 110-121 - [c7]Nils Kopal:
Solving Classical Ciphers with CrypTool 2. HistoCrypt 2018: 149:010 - 2017
- [j8]George Lasry, Ingo Niebel, Nils Kopal, Arno Wacker:
Deciphering ADFGVX messages from the Eastern Front of World War I. Cryptologia 41(2): 101-136 (2017) - [c6]Nils Kopal, Matthäus Wander, Christopher Konze, Henner Heck:
Adaptive Cheat Detection in Decentralized Volunteer Computing with Untrusted Nodes. DAIS 2017: 192-205 - 2016
- [j7]George Lasry, Nils Kopal, Arno Wacker:
Automated Known-Plaintext Cryptanalysis of Short Hagelin M-209 Messages. Cryptologia 40(1): 49-69 (2016) - [j6]George Lasry, Nils Kopal, Arno Wacker:
Ciphertext-only cryptanalysis of Hagelin M-209 pins and lugs. Cryptologia 40(2): 141-176 (2016) - [j5]George Lasry, Nils Kopal, Arno Wacker:
Cryptanalysis of columnar transposition cipher with long keys. Cryptologia 40(4): 374-398 (2016) - [j4]George Lasry, Moshe Rubin, Nils Kopal, Arno Wacker:
Cryptanalysis of Chaocipher and solution of Exhibit 6. Cryptologia 40(6): 487-514 (2016) - [i2]Nils Kopal:
Volume Raycasting mit OpenCL. CoRR abs/1609.01317 (2016) - [i1]Nils Kopal:
Rational Unified Process. CoRR abs/1609.07350 (2016) - 2015
- [j3]Olga Kieselmann, Nils Kopal, Arno Wacker:
"Löschen" im Internet. Datenschutz und Datensicherheit 39(1): 31-36 (2015) - [c5]Angelo Liguori, Francesco Benedetto, Gaetano Giunta, Nils Kopal, Arno Wacker:
Analysis and monitoring of hidden TCP traffic based on an open-source covert timing channel. CNS 2015: 667-674 - [c4]Olga Kieselmann, Nils Kopal, Arno Wacker:
A Novel Approach to Data Revocation on the Internet. DPM/QASA@ESORICS 2015: 134-149 - [c3]Nils Kopal, Olga Kieselmann, Arno Wacker:
Simulating Cheated Results Dissemination for Volunteer Computing. FiCloud 2015: 742-747 - [c2]Angelo Liguori, Francesco Benedetto, Gaetano Giunta, Nils Kopal, Arno Wacker:
SoftGap: A Multi Independent Levels of Security Cross-Domain Solution. FiCloud 2015: 754-759 - 2014
- [j2]George Lasry, Nils Kopal, Arno Wacker:
Solving the Double Transposition Challenge with a Divide-and-Conquer Approach. Cryptologia 38(3): 197-214 (2014) - [j1]Nils Kopal, Olga Kieselmann, Arno Wacker, Bernhard Esslinger:
CrypTool 2.0. Datenschutz und Datensicherheit 38(10): 701-708 (2014) - [p1]Olga Kieselmann, Nils Kopal, Arno Wacker:
Ranking Cryptographic Algorithms. Socio-technical Design of Ubiquitous Computing Systems 2014: 151-171 - 2013
- [c1]Jörg Hähner, Stefan Rudolph, Sven Tomforde, Dominik Fisch, Bernhard Sick, Nils Kopal, Arno Wacker:
A Concept for Securing Cyber-Physical Systems with Organic Computing Techniques. ARCS Workshops 2013
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-04 20:02 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint