{"id":"https://openalex.org/W3027310004","doi":"https://doi.org/10.1080/01611194.2020.1753265","title":"A French cipher from the late 19<sup>th</sup> century","display_name":"A French cipher from the late 19<sup>th</sup> century","publication_year":2020,"publication_date":"2020-05-21","ids":{"openalex":"https://openalex.org/W3027310004","doi":"https://doi.org/10.1080/01611194.2020.1753265","mag":"3027310004"},"language":"en","primary_location":{"id":"doi:10.1080/01611194.2020.1753265","is_oa":false,"landing_page_url":"https://doi.org/10.1080/01611194.2020.1753265","pdf_url":null,"source":{"id":"https://openalex.org/S185196701","display_name":"Cryptologia","issn_l":"0161-1194","issn":["0161-1194","1558-1586"],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/P4310320547","host_organization_name":"Taylor & Francis","host_organization_lineage":["https://openalex.org/P4310320547"],"host_organization_lineage_names":["Taylor & Francis"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cryptologia","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5068256409","display_name":"R\u00e9mi G\u00e9raud","orcid":"https://orcid.org/0000-0001-8719-1724"},"institutions":[{"id":"https://openalex.org/I4210145242","display_name":"Moscow State University of Technologies and Management named after K.G. Razumovskiy","ror":"https://ror.org/05c4crv67","country_code":"RU","type":"education","lineage":["https://openalex.org/I4210145242"]}],"countries":["RU"],"is_corresponding":true,"raw_author_name":"R\u00e9mi G\u00e9raud-Stewart","raw_affiliation_strings":["Correspondenceremi.geraud@ens.fr"],"affiliations":[{"raw_affiliation_string":"Correspondenceremi.geraud@ens.fr","institution_ids":["https://openalex.org/I4210145242"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5112710845","display_name":"David Naccache","orcid":"https://orcid.org/0000-0002-8651-6555"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"David Naccache","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5068256409"],"corresponding_institution_ids":["https://openalex.org/I4210145242"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.09847804,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":"45","issue":"4","first_page":"342","last_page":"370"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12572","display_name":"Intelligence, Security, War Strategy","score":0.9976000189781189,"subfield":{"id":"https://openalex.org/subfields/3320","display_name":"Political Science and International Relations"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T12572","display_name":"Intelligence, Security, War Strategy","score":0.9976000189781189,"subfield":{"id":"https://openalex.org/subfields/3320","display_name":"Political Science and International Relations"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9860000014305115,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9747999906539917,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.9056212306022644},{"id":"https://openalex.org/keywords/cipher","display_name":"Cipher","score":0.5672084093093872},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.5558847188949585},{"id":"https://openalex.org/keywords/german","display_name":"German","score":0.5556617379188538},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.516499936580658},{"id":"https://openalex.org/keywords/world-war-ii","display_name":"World War II","score":0.4800927937030792},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4230371415615082},{"id":"https://openalex.org/keywords/law","display_name":"Law","score":0.39759302139282227},{"id":"https://openalex.org/keywords/history","display_name":"History","score":0.36044618487358093},{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.34451451897621155},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.23611953854560852},{"id":"https://openalex.org/keywords/archaeology","display_name":"Archaeology","score":0.08305209875106812}],"concepts":[{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.9056212306022644},{"id":"https://openalex.org/C2780221543","wikidata":"https://www.wikidata.org/wiki/Q4681865","display_name":"Cipher","level":3,"score":0.5672084093093872},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.5558847188949585},{"id":"https://openalex.org/C154775046","wikidata":"https://www.wikidata.org/wiki/Q188","display_name":"German","level":2,"score":0.5556617379188538},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.516499936580658},{"id":"https://openalex.org/C137355542","wikidata":"https://www.wikidata.org/wiki/Q362","display_name":"World War II","level":2,"score":0.4800927937030792},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4230371415615082},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.39759302139282227},{"id":"https://openalex.org/C95457728","wikidata":"https://www.wikidata.org/wiki/Q309","display_name":"History","level":0,"score":0.36044618487358093},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.34451451897621155},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.23611953854560852},{"id":"https://openalex.org/C166957645","wikidata":"https://www.wikidata.org/wiki/Q23498","display_name":"Archaeology","level":1,"score":0.08305209875106812},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1080/01611194.2020.1753265","is_oa":false,"landing_page_url":"https://doi.org/10.1080/01611194.2020.1753265","pdf_url":null,"source":{"id":"https://openalex.org/S185196701","display_name":"Cryptologia","issn_l":"0161-1194","issn":["0161-1194","1558-1586"],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/P4310320547","host_organization_name":"Taylor & Francis","host_organization_lineage":["https://openalex.org/P4310320547"],"host_organization_lineage_names":["Taylor & Francis"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cryptologia","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":2,"referenced_works":["https://openalex.org/W2488685334","https://openalex.org/W4245027942"],"related_works":["https://openalex.org/W2315527029","https://openalex.org/W2065387230","https://openalex.org/W1987060333","https://openalex.org/W2323937687","https://openalex.org/W1995767100","https://openalex.org/W648995381","https://openalex.org/W2141885522","https://openalex.org/W2776312268","https://openalex.org/W2315910759","https://openalex.org/W2020496945"],"abstract_inverted_index":{"The":[0],"Franco-Prussian":[1],"war":[2],"(1870\u20131871)":[3],"was":[4,139],"the":[5,38,47,55,61,70,82,85,112,128,150,154],"first":[6],"major":[7],"European":[8],"conflict":[9],"during":[10],"which":[11,157],"extensive":[12],"telegraph":[13],"use":[14,30],"enabled":[15],"fast":[16],"communication":[17],"across":[18],"large":[19],"distances.":[20],"Field":[21],"officers":[22,35],"would":[23,42],"therefore":[24],"have":[25,197],"to":[26,29,46,78,94,99,108,116,181,183,193],"learn":[27],"how":[28,64],"secret":[31,52],"codes.":[32],"But":[33],"training":[34],"also":[36],"raises":[37],"probability":[39],"that":[40,90],"defectors":[41],"reveal":[43],"these":[44,104,190],"codes":[45,53,105],"enemy.":[48],"Practically":[49],"all":[50],"known":[51],"at":[54],"time":[56],"could":[57],"be":[58,95,184],"broken":[59],"if":[60,81],"enemy":[62],"knew":[63,84],"they":[65,196],"worked.":[66],"Under":[67],"Kerckhoffs\u2019":[68],"impulsion,":[69],"French":[71],"military":[72,100],"thus":[73],"developed":[74],"new":[75],"codes,":[76],"meant":[77],"resist":[79],"even":[80],"adversary":[83],"encoding":[86],"and":[87,97,124,131,144,178],"decoding":[88],"algorithms,":[89],"were":[91,106,158],"simple":[92],"enough":[93],"explained":[96],"taught":[98],"personnel.":[101],"Many":[102],"of":[103,111,133,156,173],"lost":[107],"history.":[109],"One":[110],"designs":[113],"however,":[114],"due":[115],"Major":[117],"H.":[118],"D.":[119],"Josse,":[120],"has":[121],"been":[122],"recovered":[123],"this":[125,134],"article":[126],"describes":[127],"features,":[129],"history,":[130],"role":[132],"particular":[135],"construction.":[136],"Josse\u2019s":[137,176],"code":[138],"considered":[140],"for":[141],"field":[142],"deployment":[143],"underwent":[145],"some":[146],"experimental":[147],"tests":[148],"in":[149,160],"late":[151],"1800":[152],"s,":[153],"result":[155],"condensed":[159],"a":[161],"short":[162],"handwritten":[163],"report.":[164],"During":[165],"World":[166],"War":[167],"II,":[168],"German":[169],"forces":[170],"got":[171],"hold":[172],"documents":[174,191],"describing":[175],"work,":[177],"brought":[179],"them":[180],"Berlin":[182],"analyzed.":[185],"A":[186],"few":[187],"years":[188],"later":[189],"moved":[192],"Russia,":[194],"where":[195],"resided":[198],"since.":[199]},"counts_by_year":[{"year":2024,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
