Search

Your search keyword '"Caesar cipher"' showing total 217 results

Search Constraints

Start Over You searched for: Descriptor "Caesar cipher" Remove constraint Descriptor: "Caesar cipher"
217 results on '"Caesar cipher"'

Search Results

101. Methods for database ciphering

102. Iterative Caesar cipher using grayscale image pixel values as keys

103. Enhancing Data Security in Cloud Using Split Algorithm, Caesar Cipher, and Vigenere Cipher, Homomorphism Encryption Scheme

104. Multiphase and Multiple Encryption

105. Ensuring Security in Sharing of Information Using Cryptographic Technique

106. Hybrid Cryptography WAKE (Word Auto Key Encryption) and Binary Caesar Cipher Method For Data Security

107. An Enhanced Cipher Technique Using Vigenere and Modified Caesar Cipher

108. MODIFYING THE SECURITY OF CLASSICAL CAESAR CIPHER TECHNIQUE USING SOME RANDOMIZED APPROACH

109. C3T: Cloud based Cyclic Cryptographic Technique and it’s comparative analysis with classical cipher techniques

110. A Novel Text Encryption Algorithm Based on the Two-Square Cipher and Caesar Cipher

111. Enhancing the Security of Caesar Cipher Substitution Method using a Randomized Approach for more Secure Communication

112. Vertically Scrambled Caesar Cipher Method

113. Pemecahan Sandi Kriptografi dengan Menggabungkan Metode Hill Cipher dan Metode Caesar Chipher

114. Network Security: A Survey Paper on Playfair Cipher and its Variants

115. Design and Implementation of an Algorithm to Enhance Cloud Security

116. An Efficient Cryptographic Scheme for Text Message Protection Against Brute Force and Cryptanalytic Attacks

117. A New Modified Caesar Cipher Cryptography Method with LegibleCiphertext From a Message to Be Encrypted

118. Research on Encryption Algorithm Based on Python

119. Anglo-Saxon Ciphers

120. An intelligent fibonacci approach to image steganography

121. Lossless data compression technique with encryption based approach

122. SCLCT: Secured cross language cipher technique

123. Trends of cryptography stepping from ancient to modern

124. Three-Pass Protocol Implementation in Caesar Cipher Classic Cryptography

125. The Caesar Cypher

126. Let’s Get Digital: Computers in Cinema

127. A Novel Approach to Hill Cipher

128. A New Random Encryption Algorithm for Character Type Cipher

129. Flip Flop and Double Substitution based Textual Encryption

130. Cryptography: optional subject in the degree in computer engineering in information technologies

131. Fast T2 mapping with multiple echo, caesar cipher acquisition and model-based reconstruction

132. Implementation and Result Analysis of Polyalphabetic Approach to Caesar Cipher

133. Enhancement Caesar Cipher for Better Security

134. Combination of columnar transposition cipher caesar cipher and lempel ziv welch algorithm in image security and compression

135. Enhancement three-pass protocol security with combination caesar cipher and vigenere cipher

136. Combination of Caesar Cipher Algorithm and Rivest Shamir Adleman Algorithm for Securing Document Files and Text Messages

137. Persamaan Lorenz untuk Keamanan Nomor Serial Sistem Operasi Window7

138. Atbah-Type Ciphers in the Christian Orient and Numerical Rules in the Construction of Christian Substitution Ciphers

139. ENHANCING SECURITY OF CAESAR CIPHER USING DIFFERENT METHODS

141. APLIKASI ALJABAR PADA KRIPTOGRAFI DAN KEAMANAN INFORMASI

142. Innovative enhancement of the Caesar cipher algorithm for cryptography

143. SET REPLACEMENTS Technique

144. Novel approach of playfair cipher for multilevel information security

145. The use of elements of mathematical cryptography as stimulus in the classroom

146. Study of different cryptographic technique and challenges in future

147. Proposed encryption algorithm for data security using matrix properties

148. Improved Caesar Cipher with Random Number Generation Technique and Multistage Encryption

149. Modified Block Playfair Cipher using Random Shift Key Generation

150. An Integrated Symmetric Key Cryptographic Method – Amalgamation of TTJSA Algorithm, Advanced Caesar Cipher Algorithm, Bit Rotation and Reversal method: SJA Algorithm

Catalog

Books, media, physical & digital resources