Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 232,366,209 papers from all fields of science
Search
Sign In
Create Free Account
Beale ciphers
Known as:
Beale's gold
, Beale (disambiguation)
, The Beale Ciphers
Expand
The Beale ciphers, also referred to as the Beale Papers, are a set of three ciphertexts, one of which allegedly states the location of a buried…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
12 relations
American Cryptogram Association
Ciphertext
Key (cryptography)
List of ciphertexts
Expand
Broader (1)
History of cryptography
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
Most Blessed of the Patriarchs: Thomas Jefferson and the Empire of the Imagination
A. Gordon-Reed
,
Peter S. Onuf
2016
Corpus ID: 195042271
Thomas Jefferson has had a rough few years. Since DNA established beyond a reasonable doubt that he fathered children with his…
Expand
2013
2013
Cryptanalysis of Beale Cipher Number Two
Todd D. Mateer
Cryptologia
2013
Corpus ID: 44512585
Abstract This article documents the author's attempt to solve Beale Cipher Number Two using a transcript of the original…
Expand
Review
2012
Review
2012
The Blurring Line Between Victim and Offender: Self-Produced Child Pornography and the Need for Sentencing Reform
David A. Bosak
2012
Corpus ID: 146833414
Sexting or Self-Produced Child Pornography? The Dialogue ContinuesStructured Prosecutional Discretion Within a Multidisciplinary…
Expand
2008
2008
Key Enclosed: Examining the Evidence for the Missing Key Letter of the Beale Cipher
Wa-shing. Chan
Cryptologia
2008
Corpus ID: 38429380
Abstract In this article, the evidence for the existence of the letter from Thomas J. Beale to Robert Morriss, containing the…
Expand
Review
2004
Review
2004
Procedural Guideline No . 4 – 5 Using photographic identification techniques for assessing bottlenose dolphin ( Tursiops truncatus ) abundance and behaviour
2004
Corpus ID: 59136519
Cetacean populations are increasingly being managed to support regional and international conservation policies. However…
Expand
1993
1993
A Reconstruction of the Key to Beale Cipher Number Two
John C. King
Cryptologia
1993
Corpus ID: 20092282
A reconstruction of the key used to encrypt B2 (Beale Cipher Number 2) reveals greater statistical anomalies in Bl than…
Expand
1989
1989
How women become rock musicians
Mavis Bayton
1989
Corpus ID: 141609198
This thesis is about women rock musicians in the U.K. It is based on in-depth interviews with 36 female rock musicians in the…
Expand
1982
1982
AS A BAMBOOZLEMENT
L. Kruh
1982
Corpus ID: 5468494
1980
1980
The Beale Cipher: a Dissenting Opinion
J. Gillogly
Cryptologia
1980
Corpus ID: 28851300
The Beale Treasure Cipher (Bl) has withstood the attacks of several generations of amateur and professional cryptanalysts. This…
Expand
1971
1971
Signature simulation and certain cryptographic codes
C. Hammer
Communications of the ACM
1971
Corpus ID: 15098942
Three cyphers allegedly authored by Thomas Jefferson Beale in 1822 have been the subject of intensive study for over 100 years…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE