Search

Your search keyword '"Caesar cipher"' showing total 217 results

Search Constraints

Start Over You searched for: Descriptor "Caesar cipher" Remove constraint Descriptor: "Caesar cipher"
217 results on '"Caesar cipher"'

Search Results

1. Modified Caesar Cipher and Card Deck Shuffle Rearrangement Algorithm for Image Encryption

2. Modified Caesar Cipher and Card Deck Shuffle Rearrangement Algorithm for Image Encryption.

3. Secure Data Communication in a Clustered Network in Wireless Sensor Networks using AES Cipher.

4. Hiding algorithm based fused images and Caesar cipher with intelligent security enhancement.

5. A New Hybrid Diffie-Hellman and Caesar Cipher Algorithm for Cryptography.

6. A Comparative Study of a Hybrid Approach Combining Caesar Cipher with Triple Pass Protocol and Krill Herd Optimization Algorithm (KHO)-Based Hybridization.

7. Enhanced payload volume in the least significant bits image steganography using hash function.

8. Enhanced payload volume in the least significant bits image steganography using hash function

9. A new encryption task for mathematically gifted students: Encryption arising from patterns.

12. Text Encryption Analysis of Modified Symmetric Keys using Genetic Algorithm on Caesar Cipher and One Time Pad

13. Multistage Encryption for Text Using Steganography and Cryptography.

14. Securing Critical User Information over the Internet of Medical Things Platforms Using a Hybrid Cryptography Scheme.

15. Cryptography

16. Impact of Computational Power on Cryptography

17. Encryption and Decryption Scheme for IoT Communications Using Multilevel Encryption

18. Decoding Secret Message with Frequency Analysis

19. Enhancing Data Security in Cloud Using Split Algorithm, Caesar Cipher, and Vigenere Cipher, Homomorphism Encryption Scheme

20. Ensuring Security in Sharing of Information Using Cryptographic Technique

21. PENERAPAN KOMBINASI METODE VIGENERE CIPHER, CAESAR CIPHER DAN SIMBOL BACA DALAM MENGAMANKAN PESAN

22. Combination of Hill Cipher Algorithm and Caesar Cipher Algorithm for Exam Data Security

23. Securing Critical User Information over the Internet of Medical Things Platforms Using a Hybrid Cryptography Scheme

24. A Novel Text Encryption Algorithm Based on the Two-Square Cipher and Caesar Cipher

25. Let’s Get Digital: Computers in Cinema

26. Peningkatan Keamanan Kriptografi Caesar Cipher dengan Menerapkan Algoritma Kompresi Stout Codes

27. Introduction

28. Implementasi Algoritma Caesar Chiper dan Rail Fence untuk Peningkatan Keamanan Teks Berbasis Client Server

30. Comparison of Performance Rot13 and Caesar Cipher Method for Registration Database of Vessels Berthed at P.T. Samudera Indonesia

31. Implementasi Metode Kriptografi Caesar Cipher, DES dan Citra Digital menggunakan Metode Steganografi LSB

32. Dihedral Cryptographic Technique.

33. Modifikasi Kriptografi Klasik Kombinasi Metode Vigenere Cipher dan Caesar Cipher

34. Steganography Technique and Modification of Substitution Cipher Using ASCII Code and Fibonacci Sequences

35. Implementation & Comparative Analysis of RSA, Caesar Cipher and Playfair Cipher

36. Implementation of the data encryption using caesar cipher and vernam cipher methods based on CrypTool2

37. Perancangan Aplikasi Penyisipan Pesan pada File Mp3 menggunakan Metode Parity Coding dan Enkripsi Caesar Cipher

38. Encryption of Data based on Triple encryption and Affine Algorithm

40. NETWORK SECURITY BY BLOCK CIPHERS

41. Implementation of CAESAR CIPHER Cryptography Techniques for Android Based Information Data Security

42. Comparison Encryption of How to Work Caesar Cipher, Hill Cipher, Blowfish and Twofish

44. SISTEM STEGANOGRAPHY DENGAN METODE LEAST SIGNIFCANT BIT (LSB) & METODE CAESAR CIPHER BERBASIS ANDROID

45. Cryptography: A Combination of Caesar and Affine Cipher to Conceal the Message

46. A new Modified method of Cryptography using Caesar Cipher

47. An efficient hybrid technique for message encryption using caesar cipher and deoxyribonucleic acid steganography

48. An Extended Hybridization of Vigenere and Caesar Cipher Techniques for Secure Communication.

49. Mapping private keys into one public key using binary matrices and masonic cipher: Caesar cipher as a case study.

50. Educational Application for Information Protection with the use of Cryptographic Methods - part I

Catalog

Books, media, physical & digital resources