Search

Your search keyword '"Substitution cipher"' showing total 109 results

Search Constraints

Start Over You searched for: Descriptor "Substitution cipher" Remove constraint Descriptor: "Substitution cipher" Topic transposition cipher Remove constraint Topic: transposition cipher
109 results on '"Substitution cipher"'

Search Results

1. Introduction—A Revolutionary Cipher

2. A survey on the Metaheuristics for Cryptanalysis of Substitution and Transposition Ciphers.

3. Introduction – A Revolutionary Cipher

4. A Proposed Method for Achieving the Confidentiality of Arabic Texts

5. A Proposed Method for Achieving the Confidentiality of Arabic Texts.

6. A Classical Cipher-Playfair Cipher and Its Improved Versions

7. Educational Application for Information Protection with the use of Cryptographic Methods - part I

8. TRANSPOLY HILL CIPHER -- AN IMPROVEMENT OVER TRADITIONAL HILL CIPHER.

9. Manuscrito de Voynich - Análisis del algoritmo de codificación con los métodos de cifrado conocidos en la época medieval y resultados de las marginalias que no fueron encriptadas

10. Decrypting classical cipher text using Markov chain Monte Carlo.

11. A New Cryptography Method Based on Hill and Rail Fence Algorithms

12. Brief History of Encryption

13. Analyzing the Spanish strip cipher by combining combinatorial and statistical methods

14. A Hybrid Polybius-Playfair Music Cipher

15. Soviet VIC Cipher: No Respector of Kerckoff's Principles

16. Key Space and Period of Fialka M-125 Cipher Machine

17. Network Security: A Survey Paper on Playfair Cipher and its Variants

18. Enhancement in data security using cryptography and compression

19. Related Key Chosen IV Attack on Stream Cipher Espresso Variant

20. A Novel Approach to Hill Cipher

21. Key-Amplified Cipher

22. Various Ciphers in Classical Cryptography

23. Novel approach of playfair cipher for multilevel information security

24. A Modified Hill Cipher using Randomized Approach

25. Alpha-Qwerty Cipher: An Extended Vigenere Cipher

26. A Simple Algebraic Model based Polyalphabetic Substitution Cipher

27. A Novel Approach to Security using Extended Playfair Cipher

28. Decrypting classical cipher text using Markov chain Monte Carlo

29. The perfect cipher

30. On Lai–Massey and quasi-Feistel ciphers

31. Comparative Study between Stream Cipher and Block Cipher using RC4 and Hill Cipher

32. Cracking Hill Ciphers with Goodness-of-Fit Statistics

33. A secure cryptosystem based on affine transformation

35. Cryptanalysis of an Extension of the Hill Cipher

36. Cryptanalysis of chaotic stream cipher

37. A New Modified Playfair Algorithm Using CBC

38. Overview and Analysis of Methods in Cryptography

39. Chi-Breaking from Cipher

40. Developing 3D-Playfair Cipher algorithm using structure rotation

41. Algebraic Analysis of the Simon Block Cipher Family

42. Observations on the SIMON Block Cipher Family

43. Using Spreadsheets to Teach Data Encryption Techniques

44. RASTERSCHLÜSSEL 44 – THE EPITOME OF HAND FIELD CIPHERS

45. 3D(4 X 4 X 4) - Playfair Cipher

46. A STATISTICAL ATTACK ON THE RUNNING KEY CIPHER

47. A study of four stage encryption: Experimental results

48. An analysis of an HMM-based attack on the substitution cipher with error-prone ciphertext

49. Improved Decipherment of Homophonic Ciphers

50. HOW TO MAKE THE HILL CIPHER SECURE

Catalog

Books, media, physical & digital resources