Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,889,403 papers from all fields of science
Search
Sign In
Create Free Account
Beale ciphers
Known as:
Beale's gold
, Beale (disambiguation)
, The Beale Ciphers
Expand
The Beale ciphers, also referred to as the Beale Papers, are a set of three ciphertexts, one of which allegedly states the location of a buried…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
12 relations
American Cryptogram Association
Ciphertext
Key (cryptography)
List of ciphertexts
Expand
Broader (1)
History of cryptography
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
Social Media and the Good Life: Do They Connect?
Kay Samuels
Electronic library
2017
Corpus ID: 2169594
2017
2017
“Most Blessed of the Patriarchs”: Thomas Jefferson and the Empire of the Imagination
B. Steele
2017
Corpus ID: 164647618
Thomas Jefferson has had a rough few years. Since DNA established beyond a reasonable doubt that he fathered children with his…
Expand
2016
2016
Most Blessed of the Patriarchs: Thomas Jefferson and the Empire of the Imagination
A. Gordon-Reed
,
Peter S. Onuf
2016
Corpus ID: 195042271
Thomas Jefferson has had a rough few years. Since DNA established beyond a reasonable doubt that he fathered children with his…
Expand
Review
2004
Review
2004
Procedural Guideline No . 4 – 5 Using photographic identification techniques for assessing bottlenose dolphin ( Tursiops truncatus ) abundance and behaviour
2004
Corpus ID: 59136519
Cetacean populations are increasingly being managed to support regional and international conservation policies. However…
Expand
1993
1993
A Reconstruction of the Key to Beale Cipher Number Two
John C. King
Cryptologia
1993
Corpus ID: 20092282
A reconstruction of the key used to encrypt B2 (Beale Cipher Number 2) reveals greater statistical anomalies in Bl than…
Expand
1989
1989
How women become rock musicians
Mavis Bayton
1989
Corpus ID: 141609198
This thesis is about women rock musicians in the U.K. It is based on in-depth interviews with 36 female rock musicians in the…
Expand
1988
1988
The Beale Cipher as a Bamboozlement - Part II
L. Kruh
Cryptologia
1988
Corpus ID: 17893530
Based on inconsistencies in the J. B. Ward pamphlet, The Beale Paper, statistical stylistic comparisons of the writings of Ward…
Expand
1988
1988
Formulating an objective for an economy
G. Dantzig
,
P. McAllister
,
J. Stone
Mathematical programming
1988
Corpus ID: 41372947
This paper is dedicated to the memory of E.M.L. Beale. Not a small part of Martin Beale's success in developing and solving large…
Expand
1980
1980
The Beale Cipher: a Dissenting Opinion
J. Gillogly
Cryptologia
1980
Corpus ID: 28851300
The Beale Treasure Cipher (Bl) has withstood the attacks of several generations of amateur and professional cryptanalysts. This…
Expand
1971
1971
Signature simulation and certain cryptographic codes
C. Hammer
Communications of the ACM
1971
Corpus ID: 15098942
Three cyphers allegedly authored by Thomas Jefferson Beale in 1822 have been the subject of intensive study for over 100 years…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE