{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:38:29Z","timestamp":1750307909979,"version":"3.41.0"},"reference-count":16,"publisher":"Association for Computing Machinery (ACM)","issue":"3","license":[{"start":{"date-parts":[[2006,9,1]],"date-time":"2006-09-01T00:00:00Z","timestamp":1157068800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["J. Educ. Resour. Comput."],"published-print":{"date-parts":[[2006,9]]},"abstract":"<jats:p>Many introductory courses to cryptology and computer security start with or include a discussion of classical ciphers that usually contemplates some cryptanalysis techniques used to break them. Ganz\u00faa (picklock in Spanish) is an application designed to assist the cryptanalysis of ciphertext obtained with monoalphabetic or polyalphabetic ciphers. It can use almost arbitrary character sets for the plain and cipher alphabets as well as obtain the standard relative frequencies of many languages and provide other useful data.<\/jats:p>","DOI":"10.1145\/1243481.1243485","type":"journal-article","created":{"date-parts":[[2007,6,6]],"date-time":"2007-06-06T14:37:11Z","timestamp":1181140631000},"page":"4","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Ganz\u00faa"],"prefix":"10.1145","volume":"6","author":[{"given":"Jes\u00fas Adolfo","family":"Garc\u00eda-Pasquel","sequence":"first","affiliation":[{"name":"Universidad Nacional Aut\u00f3noma de M\u00e9xico, M\u00e9xico D.F., M\u00e9xico"}]},{"given":"Jos\u00e9","family":"Galaviz","sequence":"additional","affiliation":[{"name":"Universidad Nacional Aut\u00f3noma de M\u00e9xico, M\u00e9xico D.F., M\u00e9xico"}]}],"member":"320","published-online":{"date-parts":[[2006,9]]},"reference":[{"volume-title":"2nd. ed.","author":"Bauer F. L.","key":"e_1_2_1_1_1"},{"key":"e_1_2_1_2_1","unstructured":"Bobbit M. Mike's cryptanalysis tool http:\/\/cipherlogic.army.ca\/cgi-bin\/cryptanalysis.pl  Bobbit M. Mike's cryptanalysis tool http:\/\/cipherlogic.army.ca\/cgi-bin\/cryptanalysis.pl"},{"key":"e_1_2_1_3_1","unstructured":"Cummings J. Topics in applied mathematics: cryptography Mathematics Department Carnegie Mellon University http:\/\/www.math.cmu.edu\/users\/jcumming\/teaching\/crypto\/  Cummings J. Topics in applied mathematics: cryptography Mathematics Department Carnegie Mellon University http:\/\/www.math.cmu.edu\/users\/jcumming\/teaching\/crypto\/"},{"key":"e_1_2_1_4_1","unstructured":"Galaviz J. and Magidin A. 2003. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Universidad Nacional Aut\u00f3noma de M\u00e9xico available at: http:\/\/pateame.fciencias.unam.mx\/cripto\/index.html  Galaviz J. and Magidin A. 2003. Introducci\u00f3n a la criptolog\u00eda (course notes in spanish) Departamento de Matematicas Facultad de Ciencias Universidad Nacional Aut\u00f3noma de M\u00e9xico available at: http:\/\/pateame.fciencias.unam.mx\/cripto\/index.html"},{"volume-title":"Gauz\u00faa: A cryptanalysis tool for classical ciphers","year":"2004","author":"Garc\u00eda-Pasquel A.","key":"e_1_2_1_5_1"},{"volume-title":"2nd. ed., Scribner.","author":"Kahn D.","key":"e_1_2_1_6_1"},{"key":"e_1_2_1_7_1","first-page":"5","article-title":"La cryptographie militaire","author":"Kerckhoffs A.","year":"1883","journal-title":"Journal des Sciences Militaires"},{"key":"e_1_2_1_8_1","unstructured":"Peschel J. Key recovery utilities and resources http:\/\/users.castel.nl\/~groor01\/crack.htm  Peschel J. Key recovery utilities and resources http:\/\/users.castel.nl\/~groor01\/crack.htm"},{"key":"e_1_2_1_9_1","unstructured":"Quer-I J. 1996. Criptograf\u00eda Departamento de Computaci\u00f3n Universidad de Buenos Aires Argentina course web page: http:\/\/www.dc.uba.ar\/eci\/96\/n1.html  Quer-I J. 1996. Criptograf\u00eda Departamento de Computaci\u00f3n Universidad de Buenos Aires Argentina course web page: http:\/\/www.dc.uba.ar\/eci\/96\/n1.html"},{"key":"e_1_2_1_10_1","unstructured":"Rami\u00f3 J. 2003. Seguridad inform\u00e1tica Universidad Polit\u00e9cnica de Madrid Spain course web page: http:\/\/www.lpsi.eui.upm.es\/SInformatica\/SInformatica.htm  Rami\u00f3 J. 2003. Seguridad inform\u00e1tica Universidad Polit\u00e9cnica de Madrid Spain course web page: http:\/\/www.lpsi.eui.upm.es\/SInformatica\/SInformatica.htm"},{"key":"e_1_2_1_11_1","unstructured":"Russell M. CRANK: CRyptANalysis toolKit http:\/\/crank.sourceforge.net\/about.html  Russell M. CRANK: CRyptANalysis toolKit http:\/\/crank.sourceforge.net\/about.html"},{"key":"e_1_2_1_12_1","unstructured":"Sinkov A. 1990. Elementary Cryptoanalysis: a Mathematical Approach 6th ed. th ed. th ed. th ed. New Mathematics Library (No. 22).  Sinkov A. 1990. Elementary Cryptoanalysis: a Mathematical Approach 6th ed. MAA New Mathematics Library (No. 22)."},{"volume-title":"CAP: A software tool for teaching classical cryptology, Colloquium for Information Systems Security Education (CISSE","year":"2002","author":"Spillman R.","key":"e_1_2_1_13_1"},{"key":"e_1_2_1_14_1","unstructured":"Sun Microsystems. 2005 Core Java internationalization http:\/\/java.sun.com\/j2se\/corejava\/intl\/index.jsp  Sun Microsystems. 2005 Core Java internationalization http:\/\/java.sun.com\/j2se\/corejava\/intl\/index.jsp"},{"key":"e_1_2_1_15_1","unstructured":"Weibel C. 2002 Math 395: (An introduction to cryptography) Mathematics Department Rutgers University http:\/\/www.math.rutgers.edu\/courses\/395\/s02\/395syllabus.html  Weibel C. 2002 Math 395: (An introduction to cryptography) Mathematics Department Rutgers University http:\/\/www.math.rutgers.edu\/courses\/395\/s02\/395syllabus.html"},{"key":"e_1_2_1_16_1","unstructured":"W3C (World Wide Web Consortium) 2004. XML Schema: Specifications and development http:\/\/www.w3.org\/XML\/Schema#dev  W3C (World Wide Web Consortium) 2004. XML Schema: Specifications and development http:\/\/www.w3.org\/XML\/Schema#dev"}],"container-title":["Journal on Educational Resources in Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1243481.1243485","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1243481.1243485","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T14:47:49Z","timestamp":1750258069000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1243481.1243485"}},"subtitle":["A cryptanalysis tool for monoalphabetic and polyalphabetic ciphers"],"short-title":[],"issued":{"date-parts":[[2006,9]]},"references-count":16,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2006,9]]}},"alternative-id":["10.1145\/1243481.1243485"],"URL":"https:\/\/doi.org\/10.1145\/1243481.1243485","relation":{},"ISSN":["1531-4278","1531-4278"],"issn-type":[{"type":"print","value":"1531-4278"},{"type":"electronic","value":"1531-4278"}],"subject":[],"published":{"date-parts":[[2006,9]]},"assertion":[{"value":"2006-09-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}