Publication List

On this page, you find all of my scientific publications. You can find me on research gate and my publications on google scholar.

List of scientific publications as a first author

  1. Kopal, Nils, and Bernhard Esslinger. “Wie wir unser geheimes Erbe entschlüsseln.” Erinnerung (2022): 223.
  2. Kopal, N., and Esslinger B. “New Ciphers and Cryptanalysis Components in CrypTool 2.” International Conference on Historical Cryptology. 2022.
  3. Kopal, N., and Waldispühl M. “Deciphering three diplomatic letters sent by Maximilian II in 1575.” Cryptologia 46.2 (2022): 103-127.
  4. Kopal, N. and Waldispühl M. “Two Encrypted Diplomatic Letters Sent by Jan Chodkiewicz to Emperor Maximilian II in 1574-1575.” International Conference on Historical Cryptology. 2021.
  5. Kopal, N. “Of ciphers and neurons – detecting the type of ciphers using artificial neural networks.” Proceedings of the 3rd International Conference on Historical Cryptology HistoCrypt. No. 171. 2020.
  6. Kopal, N. “Cryptanalysis of homophonic substitution ciphers using simulated annealing with fixed temperature.” Proceedings of the 2nd International Conference on Historical Cryptology, HistoCrypt. 2019.
  7. Kopal, N, and Esslinger B. “CrypTool 2–Ein Open-Source-Projekt zur Kryptologie für Lehre, Forschung, Selbststudium und Experimentieren.”, DACH Security, Gelsenkirchen, 2018
  8. Kopal, N.; Secure Volunteer Computing for Distributed Cryptanalysis. kassel university press GmbH (2018)
  9. Kopal, N., Wander, M., Konze, C., Heck, H.: Adaptive Cheat Detection in Decentralized Volunteer Computing with Untrusted Nodes. IFIP International Conference on Distributed Applications and Interoperable Systems (DAIS). pp. 192-205. Springer (2017).
  10. Kopal, N., Heck, H., Wacker, A.: Simulating Cheated Results Acceptance Rates for Gossip-Based Volunteer Computing. International Journal of Mobile Network Design and Innovation. 7, 56–67 (2017).
  11. Kopal, Nils. “Solving classical ciphers with CrypTool 2.” Proceedings of the 1st International Conference on Historical Cryptology HistoCrypt 2018. No. 149. Linköping University Electronic Press, 2018.
  12. Kopal, N., Kieselmann, O., Wacker, A.: “Simulating Cheated-Results-Dissemination for Volunteer Computing”. 1st International Workshop on Signal Processing for Secure Communications (SP4SC-2015), held in conjunction with 3rd International Conference on Future Internet of Things and Cloud (FiCloud 2015). IEEE, Rome, Italy (2015).
  13. Kopal, N.: “An Architecture for Creating a Secure Unstructured Peer-To-Peer-Based Volunteer Computing Cloud”. In: Sick, B. and Tomforde, S. (eds.) Organic Computing: Doctoral Dissertation Colloquium 2015. Kassel University Press GmbH. (2015).
  14. Kopal, N., Kieselmann, O., Wacker, A., Esslinger, B.: „CrypTool 2.0. Open-Source Kryptologie für Jedermann“. Datenschutz und Datensicherheit (DuD). 701 – 708 (2014).
  15. Kopal, N., Kieselmann, O., Wacker, A.: “Self-Organized Volunteer Computing”. In: Sick, B. and Tomforde, S. (eds.) Organic Computing: Doctoral Dissertation Colloquium 2014. pp. 129-139. Kassel University Press GmbH. (2014).

List of publications as co-author

  1. Megyesi, Beáta, et al. “Historical Language Models in Cryptanalysis: Case Studies on English and German.” International Conference on Historical Cryptology. 2023.
  2. Mikhalev, Vasily, et al. “What is the Code for the Code? Historical Cryptology Terminology.” International Conference on Historical Cryptology. 2023.
  3. Megyesi, Beáta, et al. “Keys with nomenclatures in the early modern Europe.” Cryptologia (2022): 1-43.
  4. Dunin, E., Ekhall, M., Hamidullin, K., Kopal, N., Lasry, G., & Schmeh, K. (2022). “How we set new world records in breaking Playfair ciphertexts”. Cryptologia, 46(4), 302-322
  5. Fürthauer, N., Mikhalev, V., Kopal, N., Esslinger, B., Lampesberger, H., & Hermann, E. (2022, June). “Evaluating Deep Learning Techniques for Known-Plaintext Attacks on the Complete Columnar Transposition Cipher”. In International Conference on Historical Cryptology (pp. 82-90).
  6. Megyesi, B., et al. “What Was Encoded in Historical Cipher Keys in the Early Modern Era?.” International Conference on Historical Cryptology. 2022.
  7. Leierzopf, E., Mikhalev, V., Kopal, N., Esslinger, B., Lampesberger, H., & Hermann, E. (2021, December). “Detection of Classical Cipher Types with Feature-Learning Approaches”. In Australasian Conference on Data Mining (pp. 152-164). Springer, Singapore.
  8. Lasry, George, Beáta Megyesi, and Nils Kopal. “Deciphering papal ciphers from the 16th to the 18th Century.” Cryptologia 45.6 (2021): 479-540.
  9. Dinnissen, Jorgen and Kopal, Nils. “Island Ramanacoil a Bridge too Far. A Dutch Ciphertext from 1674.” International Conference on Historical Cryptology. 2021.
  10. Leierzopf, Ernst, et al. “A massive machine-learning approach for classical cipher type detection using feature engineering.” International Conference on Historical Cryptology. 2021.
  11. Megyesi, B., Esslinger, B., Fornés, A., Kopal, N., Láng, B., Lasry, G., … & Waldispühl, M. (2020). Decryption of historical manuscripts: the DECRYPT project. Cryptologia, 44(6), 545-559.
  12. Lasry, G., Kopal N., and Wacker A. “Cryptanalysis of Enigma double indicators with hill climbing.” Cryptologia 43.4 (2019): 267-292.
  13. Lasry, G., Kopal N., and Wacker A. “Ciphertext-only cryptanalysis of short Hagelin M-209 ciphertexts.” Cryptologia 42.6 (2018): 485-513.
  14. Heck, H., Kieselmann, O., Kopal, N., & Wacker, A. (2018, June). “A Decentralized Resilient Short-Term Cache for Messaging”. In IFIP International Conference on Distributed Applications and Interoperable Systems (pp. 110-121). Springer, Cham.
  15. Lasry, G., Niebel, I., Kopal, N., Wacker, A.: “Deciphering ADFGVX Messages from World War I Eastern Front”. Cryptologia. 1-36 (2016).
  16. Lasry, G., Kopal, N., Wacker, A.: “Cryptanalysis of the Columnar Transposition Cipher with Long Keys”. Cryptologia. 1-25 (2016).
  17. Lasry, G., Rubin, M., Kopal, N., Wacker, A.: “Cryptanalysis of Chaocipher and Solution of Exhibit 6. Cryptologia”. 1-28 (2016).
  18. Liguori, A., Benedetto, F., Giunta, G., Kopal, N., Wacker, A.: “Analysis and Monitoring of Hidden TCP Traffic Based on an Open-Source Covert Timing Channel”. 1st IEEE Workshop on Security and Privacy in Cybermatics (SPiCy 2015), held in conjunction with 3rd International Conference on Communications and Network Security (IEEE CNS 2015). pp. 667-674. IEEE (2015).
  19. Kieselmann, O., Kopal, N., Wacker, A.: “Löschen” im Internet. Ein neuer Ansatz für die technische Unterstützung des Rechts auf Löschen. Datenschutz und Datensicherheit (DuD). 31-36 (2015).
  20. Calma, A., Jänicke, M., Kantert, J., Kopal, N., Siefert, F., Tomforde, S.: “Horizontal Integration of Organic Computing and Control Theory Concepts”. In: Sick, B. and Tomforde, S. (eds.) Organic Computing: Doctoral Dissertation Colloquium 2015. Kassel University Press GmbH (2015).
  21. Kieselmann, O., Kopal, N., Wacker, A.: “A Novel Approach to Data Revocation on the Internet”. 10th DPM International Workshop on Data Privacy Management (DPM 2015), co-located with 20th European Symposium on Research in Computer Security (ESORICS 2015). p. 134–149. Vienna, Austria (2015).
  22. Lasry, G., Kopal, N., Wacker, A.: “Ciphertext-Only Cryptanalysis of Hagelin M-209 Pins and Lugs”. Cryptologia. 1-36 (2015).
  23. Liguori, A., Benedetto, F., Giunta, G., Kopal, N., Wacker, A.: “SoftGap: a Multi Independent Levels of Security Cross-Domain Solution”. 1st International Workshop on Signal Processing for Secure Communications (SP4SC-2015), held in conjunction with 3rd International Conference on Future Internet of Things and Cloud (FiCloud 2015). IEEE, Rome, Italy (2015).
  24. Lasry, G., Kopal, N., Wacker, A.: “Automated Known-Plaintext Cryptanalysis of Short Hagelin M-209 Messages”. Cryptologia. 1-21 (2015).
  25. Lasry, G., Kopal, N., Wacker, A.: “Solving the Double Transposition Challenge with a Divide and Conquer Approach”. Cryptologia. 38, 197-214 (2014).
  26. Kieselmann, O., Kopal, N., Wacker, A.: „Ranking Cryptographic Algorithms“. In: David, K., Geihs, K., Leimeister, J.M., Roßnagel, A., Schmidt, L., Stumme, G., and Wacker, A. (eds.) Socio-technical Design of Ubiquitous Computing Systems. pp. 151-171. Springer, Berlin (2014).
  27. Kieselmann, O., Kopal, N., Wacker, A.: „Interdisziplinäre Sicherheitsanalyse“. 10. Berliner Werkstatt Mensch-Maschine-Systeme – Grundlagen und Anwendungen der Mensch-Maschine-Interaktion. , Berlin (2013).
  28. Hähner, J., Rudolph, S., Tomforde, S., Fisch, D., Sick, B., Kopal, N., Wacker, A.: “A Concept for Securing Cyber-Physical Systems with Organic Computing Techniques”. 1st International Workshop on „Self-optimization in organic and Autonomic Computing Systems“ (SAOS13), held in conjunction with 26th International Conference on Architecture of Computing Systems (ARCS 2013). Prague, Czech Republic (2013).

List of popular science publications

  1. Kopal N., Dinnissen J., “Konzerngeheimnisse – Entschlüsselt: Ein Brief der Niederländischen Ostindien-Kompanie”. c’t 16/2022 S. 130
  2. Kopal N., Waldispühl M., “Kryptische Propaganda – Entschlüsselt: Briefe von Kaiser Maximilian II”. c’t 4/2022 S. 130
  3. Kopal N., Megyesi B., “Die Kryptografen des Papstes – Entschlüsselt: Geheime Nachrichten aus dem Vatikan”. c’t 3/2022 S. 134
  4. Kopal N., Esslinger B., “Krypto ganz unkryptisch – Mit CrypTool 2 moderne Kryptografie ausprobieren und verstehen”. c’t 15/2021 S. 142