Search

Your search keyword '"Substitution cipher"' showing total 334 results

Search Constraints

Start Over You searched for: Descriptor "Substitution cipher" Remove constraint Descriptor: "Substitution cipher"
334 results on '"Substitution cipher"'

Search Results

1. Introduction—A Revolutionary Cipher

4. Never Underestimate Substitution Cipher with Diffusion

5. Invo-Substitute: Three Layer Encryption For Enhanced E-Commerce Website Security Using Substitution Cipher And Involution Function.

6. Isomorphic Unordered Labeled Trees up to Substitution Ciphering

7. An Efficient and Privacy-Preserving Scheme for Disease Prediction in Modern Healthcare Systems.

8. SECURING COMMUNICATION IN CHATTER APPLICATION.

9. A survey on the Metaheuristics for Cryptanalysis of Substitution and Transposition Ciphers.

10. Introduction – A Revolutionary Cipher

11. Substitution Ciphers

12. A Novel Ant Colony Optimization Based Cryptanalysis of Substitution Cipher

14. The Mystery of the Dancing Men.

15. A Proposed Method for Achieving the Confidentiality of Arabic Texts

16. An Efficient and Privacy-Preserving Scheme for Disease Prediction in Modern Healthcare Systems

17. Improved Color Image Encryption using Hybrid Modulus Substitution Cipher and Chaotic Method.

18. Combining Several Substitution Cipher Algorithms using Circular Queue Data Structure.

19. Finding the key length of a Vigenère cipher: How to improve the twist algorithm.

20. Data security based on homographic function.

21. Randomized Cryptosystem Based on Linear Transformation

23. SUBSTITUTION- SHIFTING- FOLDING CIPHER ALGORITHM WITH DYNAMIC SYMMETRIC ENCRYPTION KEY.

24. AUTOMATED CRYPTANALYSIS OF SUBSTITUTION CIPHER USING HILL CLIMBING WITH WELL DESIGNED HEURISTIC FUNCTION.

25. Crypto Goes to War: 1861–1865

26. The Interwar Period 1919–1939

29. A Proposed Method for Achieving the Confidentiality of Arabic Texts.

30. Probabilistic Methods for a Japanese Syllable Cipher

31. Steganography Technique and Modification of Substitution Cipher Using ASCII Code and Fibonacci Sequences

32. The Mystery of the Dancing Men

36. NETWORK SECURITY BY BLOCK CIPHERS

37. An Efficient IoT-Based Patient Monitoring and Heart Disease Prediction System Using Deep Learning Modified Neural Network

38. A Review on Metaheuristic Techniques in Automated Cryptanalysis of Classical Substitution Cipher

39. Mapping private keys into one public key using binary matrices and masonic cipher: Caesar cipher as a case study.

40. A Classical Cipher-Playfair Cipher and Its Improved Versions

41. Educational Application for Information Protection with the use of Cryptographic Methods - part I

42. Improved Color Image Encryption using Modified Modulus Substitution Cipher, Dual Random Key and Chaos Method

43. Experimental Analysis of the Dorabella Cipher with Statistical Language Models

44. TRANSPOLY HILL CIPHER -- AN IMPROVEMENT OVER TRADITIONAL HILL CIPHER.

45. Finding the key length of a Vigenère cipher: How to improve the twist algorithm

46. An Improved Genetic Algorithm and A New Discrete Cuckoo Algorithm for Solving the Classical Substitution Cipher

48. Cryptography and Secret Communications in Ancient World

49. Isomorphic unordered labeled trees up to substitution ciphering

50. A novel visual cryptography scheme based on substitution cipher.

Catalog

Books, media, physical & digital resources