Search

Your search keyword '"Substitution cipher"' showing total 29 results

Search Constraints

Start Over You searched for: Descriptor "Substitution cipher" Remove constraint Descriptor: "Substitution cipher" Language english Remove constraint Language: english
29 results on '"Substitution cipher"'

Search Results

1. An Efficient and Privacy-Preserving Scheme for Disease Prediction in Modern Healthcare Systems.

2. SECURING COMMUNICATION IN CHATTER APPLICATION.

3. A survey on the Metaheuristics for Cryptanalysis of Substitution and Transposition Ciphers.

4. The Mystery of the Dancing Men.

5. A Proposed Method for Achieving the Confidentiality of Arabic Texts

6. Improved Color Image Encryption using Hybrid Modulus Substitution Cipher and Chaotic Method.

7. Combining Several Substitution Cipher Algorithms using Circular Queue Data Structure.

8. Finding the key length of a Vigenère cipher: How to improve the twist algorithm.

9. Data security based on homographic function.

10. AUTOMATED CRYPTANALYSIS OF SUBSTITUTION CIPHER USING HILL CLIMBING WITH WELL DESIGNED HEURISTIC FUNCTION.

11. SUBSTITUTION- SHIFTING- FOLDING CIPHER ALGORITHM WITH DYNAMIC SYMMETRIC ENCRYPTION KEY.

12. A Proposed Method for Achieving the Confidentiality of Arabic Texts.

13. Mapping private keys into one public key using binary matrices and masonic cipher: Caesar cipher as a case study.

14. Cryptography and Secret Communications in Ancient World

15. Isomorphic unordered labeled trees up to substitution ciphering

16. A novel visual cryptography scheme based on substitution cipher.

17. An intelligent key related attack using NSGA II algorithm.

18. Probabilistic Methods for a Japanese Syllable Cipher.

19. TRANSPOLY HILL CIPHER -- AN IMPROVEMENT OVER TRADITIONAL HILL CIPHER.

20. Poe's tree

21. Decrypting classical cipher text using Markov chain Monte Carlo.

22. Attacking Letter Substitution Ciphers with Integer Programming.

23. Modified Vegenere Cipher to Enhance Data Security Using Monoalphabetic Cipher

24. A New Substitution Cipher - Random-X

25. Substitution block ciphers with functional keys

26. A Modified Encryption Technique using Playfair Cipher 10 by 9 Matrix with Six Iteration Steps

27. Cryptanalysis of a chaotic block cipher with external key and its improved version

28. An Extended Hybridization of Vigenere and Caesar Cipher Techniques for Secure Communication

29. Encrypted objects and decryption processes: problem-solving with functions in a learning environment based on cryptography

Catalog

Books, media, physical & digital resources