Search

Your search keyword '"Substitution cipher"' showing total 334 results

Search Constraints

Start Over You searched for: Descriptor "Substitution cipher" Remove constraint Descriptor: "Substitution cipher"
334 results on '"Substitution cipher"'

Search Results

251. THE NIAGARA CIPHER - PART II

252. HOW WE SOLVED THE $100,000 DECIPHER PUZZLE (16 HOURS TOO LATE)

253. INSIDE A KGB CIPHER

254. THE VARARUCHI CIPHER

255. THE MATRIX CIPHER OF C. L. DODGSON

256. An Analysis of the Hermes8 Stream Ciphers

257. Equivocations for Homophonic Ciphers

258. Security Analysis and Modification of Classical Encryption Scheme

259. Cryptanalysis of Simple Substitution Ciphers Using Particle Swarm Optimization

260. General multiplication-shift cipher

261. Multiplication-shift cipher

263. An Artificial Life Technique for the Cryptanalysis of Simple Substitution Ciphers

264. Cryptographic Properties of Some Cryptosystem with Modulation of the Chaotic Sequence Parameters

265. Cryptanalysis of Substitution Ciphers Using Scatter Search

266. Polyalphabetic Substitution Ciphers

267. Cryptanalysis of Block Ciphers Based on SHA-1 and MD5

268. Cryptanalysis of the Mercy Block Cipher

269. On the Cryptographic Patterns and Frequencies in Turkish Language

270. A 77-YEAR OLD CHALLENGE CIPHER

271. The Enigma cipher machine

272. The Hagelin cipher machine

273. Linear Cryptanalysis Method for DES Cipher

274. A Constraint Satisfaction Algorithm for the Automated Decryption of Simple Substitution Ciphers

275. Cryptanalysis of tree-structured ciphers

276. Cryptanalysis of ‘Labyrinth’ stream cipher

277. Image encryption method using a class of fractals

278. A POLYGRAPHIC SUBSTITUTION CIPHER BASED ON MULTIPLE INTERLOCKING APPLICATIONS OF PLAYFAIR

279. Breaking substitution ciphers using a relaxation algorithm

280. IMPROVING THE MACHINE RECOGNITION OF VOWELS IN SIMPLE SUBSTITUTION CIPHERS

281. CRYPTANALYTIG PROPERTIES OF SHORT SUBSTITUTION CIPHERS

282. Sounds on key equivocation for simple substitution ciphers

283. A product rule relaxation method

284. THE GROMARK CIPHER, AND SOME RELATIVES

285. THE AUTOMATED CRYPTANALYSIS OF POLYALPHABETIC CIPHERS

286. THE ARYABHATA CIPHER

288. COMPUTER CRYPTANALYSIS OF PRODUCT CIPHERS

289. THE AUTOMATED CRYPTANALYSIS OF SUBSTITUTION CIPHERS

290. A MATHEMATICAL WORD BLOCK CIPHER

291. AN EMPIRICAL METHOD FOR FINDING THE KEYLENGTH OF PERIODIC CIPHERS

292. THE BEALE CIPHER: A DISSENTING OPINION

293. A TRIGRAPH CIPHER WITH A SHORT KEY FOR HAND USE

294. Decoding Substitution Ciphers by Means of Word Matching with Application to OCR

295. Bounds on message equivocation for simple substitution ciphers

296. FROM THE ARCHIVES: A BLETCHLEY PARK ASSESSMENT OF GERMAN INTELLIGENCE ON TORCH

297. THE HISTORY OF A CIPHER, 1602–1772

298. An Extended Hybridization of Vigenere and Caesar Cipher Techniques for Secure Communication

299. Encrypted objects and decryption processes: problem-solving with functions in a learning environment based on cryptography

300. BRITISH ROCKEX CIPHER MACHINES

Catalog

Books, media, physical & digital resources