Search

Your search keyword '"Plaintext"' showing total 40 results

Search Constraints

Start Over You searched for: Descriptor "Plaintext" Remove constraint Descriptor: "Plaintext" Publication Type Academic Journals Remove constraint Publication Type: Academic Journals
40 results on '"Plaintext"'

Search Results

2. Proposed Hybrid Cryptosystems Based on Modifications of Playfair Cipher and RSA Cryptosystem.

3. Automated Deep Learning BLACK-BOX Attack for Multimedia P-BOX Security Assessment

4. Encryption using semigroup action

7. New approach for attack of permutation-based image encryption schemes.

10. Known-Plaintext Attack and Ciphertext-Only Attack for Encrypted Single-Pixel Imaging

12. How to encrypt a graph.

13. Analisis Modifikasi Metode Playfair Cipher Dalam Pengamanan Data Teks

14. A block encryption algorithm based on exponentiation transform

15. Double‐image asymmetric cryptosystem using cylindrical diffraction and spectrum fusion and compression.

16. Cryptanalysis of some stream ciphers based on n-ary groupoids.

17. Plaintext recovery attack on 3DES algorithm with different byte keys.

18. Optimized deep neural network for cryptanalysis of DES.

19. Cryptography and Network Security: A Historical Transformation.

20. A block encryption algorithm based on exponentiation transform.

22. Modified honey encryption scheme for encoding natural language message.

23. هجوم الصندوق الأسود لمحاكاة أنظمة التشفير الانسيابي باستخدام المعرف العصبي

24. Replication of ciphertext in cryptographic system

25. Replication of Ciphertext in Cryptographic System.

26. An automatic cryptanalysis of simple substitution ciphers using compression.

28. DATA SECURITY IN LOCAL AREA NETWORK BASED ON FAST ENCRYPTION ALGORITHM

29. Multidimensional zero‐correlation linear cryptanalysis of the block cipher KASUMI.

30. A Symmetric Key Block Cipher to Provide Confidentiality in Wireless Sensor Networks.

31. Symmetric Key Encryption Technique: A Cellular Automata based Approach in Wireless Sensor Networks.

32. A New Modified Caesar Cipher Cryptography Method with LegibleCiphertext From a Message to Be Encrypted.

33. Randomized Text Encryption: a New Dimension in Cryptography.

34. A MULTIPLE-PLAINTEXTS-ORIENTED CHAOTIC CRYPTOSYSTEM.

35. BaseTen Cryptographic Algorithm Based on Playfair Cipher.

36. A Generalized Hill Cipher Involving Different Powers of a Key, Mixing and Substitution.

37. Selecting Plaintext in Rabin Cryptosystems Using Padding Generated by Pseudo-Random Bit Generators.

38. Transposition Technique for Cryptography.

39. Three-Pass Cryptosystems Based on Discrete Logarithms.

40. Variants of Public Key Cryptosystem RSA.

Catalog

Books, media, physical & digital resources