{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,19]],"date-time":"2026-03-19T14:42:08Z","timestamp":1773931328759,"version":"3.50.1"},"reference-count":12,"publisher":"Informa UK Limited","issue":"6","funder":[{"DOI":"10.13039\/100006807","name":"Furman University","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100006807","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["Cryptologia"],"published-print":{"date-parts":[[2024,11]]},"DOI":"10.1080\/01611194.2023.2275583","type":"journal-article","created":{"date-parts":[[2023,12,12]],"date-time":"2023-12-12T12:33:02Z","timestamp":1702384382000},"page":"558-573","update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":2,"title":["Modifying twist algorithms for determining the key length of a Vigen\u00e8re cipher"],"prefix":"10.1080","volume":"48","author":[{"given":"Christian","family":"Millichap","sequence":"first","affiliation":[]},{"given":"Yeeka","family":"Yau","sequence":"additional","affiliation":[]},{"given":"Alyssa","family":"Pate","sequence":"additional","affiliation":[]},{"given":"Morgan","family":"Carns","sequence":"additional","affiliation":[]}],"member":"301","published-online":{"date-parts":[[2023,12,12]]},"reference":[{"key":"e_1_3_3_2_1","doi-asserted-by":"publisher","DOI":"10.1080\/01611194.2014.988365"},{"key":"e_1_3_3_3_1","doi-asserted-by":"publisher","DOI":"10.1080\/01611194.2016.1141556"},{"key":"e_1_3_3_4_1","unstructured":"Bauer C. P.. 2021. Secret history\u2014the story of cryptology. 2nd ed. Chapman & Hall\/CRC cryptography and network security. Boca Raton FL: CRC Press."},{"key":"e_1_3_3_5_1","doi-asserted-by":"publisher","DOI":"10.1080\/01611190600826729"},{"key":"e_1_3_3_6_1","doi-asserted-by":"publisher","DOI":"10.1080\/01611194.2016.1170424"},{"key":"e_1_3_3_7_1","unstructured":"de Vigen\u00e9re B. 1585. Traict\u00e9 des chiffres ou secretes manieres d\u2019escrire"},{"key":"e_1_3_3_8_1","doi-asserted-by":"crossref","unstructured":"Dooley J. F. 2018. History of cryptography and cryptanalysis: codes ciphers and their algorithms history of computing. Springer Cham.","DOI":"10.1007\/978-3-319-90443-6"},{"key":"e_1_3_3_9_1","article-title":"The index of coincidence and its application in cryptography","volume":"22","author":"Friedman W. F.","year":"1920","unstructured":"Friedman, W. F. 1920. The index of coincidence and its application in cryptography. Riverbank Laboratories Department of Ciphers Publication 22.","journal-title":"Riverbank Laboratories Department of Ciphers Publication"},{"key":"e_1_3_3_10_1","volume-title":"The codebreakers: The comprehensive history of secret communication from ancient times to the internet","author":"Kahn D.","year":"1996","unstructured":"Kahn, D. 1996. The codebreakers: The comprehensive history of secret communication from ancient times to the internet. New York, NY: Scribner."},{"key":"e_1_3_3_11_1","volume-title":"Geheimschriften und die dechiffrirkunst","author":"Kasiski F. W.","year":"1863","unstructured":"Kasiski, F. W. 1863. Geheimschriften und die dechiffrirkunst. Mittler und Sohn."},{"key":"e_1_3_3_12_1","doi-asserted-by":"publisher","DOI":"10.1080\/0161-118891862963"},{"key":"e_1_3_3_13_1","doi-asserted-by":"publisher","DOI":"10.1080\/01611194.2019.1657202"}],"container-title":["Cryptologia"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/01611194.2023.2275583","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T05:07:59Z","timestamp":1729573679000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/01611194.2023.2275583"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,12,12]]},"references-count":12,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2024,11]]}},"alternative-id":["10.1080\/01611194.2023.2275583"],"URL":"https:\/\/doi.org\/10.1080\/01611194.2023.2275583","relation":{},"ISSN":["0161-1194","1558-1586"],"issn-type":[{"value":"0161-1194","type":"print"},{"value":"1558-1586","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,12,12]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=ucry20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=ucry20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"},{"value":"2023-12-12","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}