“…These adjustments are informed by assumptions about ciphers used to produce the data (Knight and Yamada, 1999;Knight et al, 2006;Ravi and Knight, 2011;Pourdamghani and Knight, 2017). Besides the commonly used EM algorithm, (Nuhn et al, 2013;Hauer et al, 2014;Kambhatla et al, 2018) also tackles substitution decipherment and formulate this problem as a heuristic search procedure, with guidance provided by an external language model (LM) for candidate rescoring. So far, techniques developed for man-made ciphers have not been shown successful in deciphering archaeological data.…”