Showing 201 - 220 results of 2,263 for search '"cipher"', query time: 0.10s Refine Results
  1. 201
  2. 202
  3. 203
  4. 204
  5. 205
  6. 206
  7. 207
  8. 208

    Implementation of hybrid encryption method using caesar cipher algorithm by Tat Wi, Charomie

    Published 2010
    “…For that matter, encryption method known as Caesar cipher, one of the simplest and most widely used encryption techniques. …”
    Get full text
    Undergraduates Project Papers
  9. 209

    Implementation of hybrid encryption method using caesar cipher algorithm by Charomie, Tat Wi

    Published 2010
    “…In daily life,we use Internet or accessing information from various sources.Some of the procedure requires us to sending our own information.The objective of this project is to explore the way of doing encryption,improve certain aspect of the existing algorithm and to find out a way to create better security.In this project,encryption will be implemented in information on a web that makes it hard to be readable and secure.For that matter,encryption method known as Caesar cipher,one of the simplest and most widely used encryption techniques.In this encryption,it uses the substitution cipher in which each letter in the plaintext is replaced by some fixed number of position down the alphabet. …”
    Get full text
    Undergraduates Project Papers
  10. 210

    Security Analysis of QAM Quantum-Noise Randomized Cipher System by Yukai Chen, Haisong Jiao, Hua Zhou, Jilin Zheng, Tao Pu

    Published 2020-01-01
    Subjects: “…quantum-noise randomized cipher…”
    Get full text
    Article
  11. 211
  12. 212

    Application Of Rectangular Matrices: Affine Cipher Using Asymmetric Keys by Maxrizal Maxrizal, Baiq Desy Aniska Prayanti

    Published 2019-06-01
    Subjects: “…cryptography, symmetric key algorithms, asymmetric key algorithms, affine cipher using asymmetric keys, rectangular matrices…”
    Get full text
    Article
  13. 213
  14. 214

    METHOD OT DATA AND KNOWLEDGE PROCESSING IN INTERNET WITH CIPHERING SUPPORT by V. A. Vishniakov, D. S. Borodaenko

    Published 2019-06-01
    “…Algorithm of queries translation for the ciphering support is modifying with unity operations for queries coding with inhomogeneous mapping on relational model. …”
    Get full text
    Article
  15. 215
  16. 216
  17. 217

    IMPLEMENTASI ENKRIPSI DEKRIPSI ALGORITMA AFFINE CIPHER BERBASIS ANDROID by Sasono Wibowo, Florentina Esti Nilawati, Suharnawi Suharnawi

    Published 2014-11-01
    “…Algoritma affine cipher merupakan perkembangan dari algoritma caesar dimana algoritma affine cipher menggunakan dua kunci. …”
    Get full text
    Article
  18. 218

    Attack on the Simple Substitution Ciphers Using Particle Swarm Optimization by Ismail K. Ali, Ahmed Tariq Sadiq, Hilal Hadi Salih

    Published 2010-05-01
    “…It is shown that such algorithm could be usedto break the key for a simple substitution cipher. This paper presents aproposed 2-opt PSO algorithm to enhance the efficiency of PSO algorithmon attacking simple substitution ciphers.…”
    Get full text
    Article
  19. 219

    XSL Block Ciphers’ Key-schedules with Resistance to Differential Cryptanalysis by Marina Aleksandrovna Pudovkina, Georgy Igorevich Khoruzhenko

    Published 2014-05-01
    “…The paper discusses the resistance of XSL block ciphers to differential cryptanalysis. AES-like block ciphers with alternative key-schedules (increased performance and density) are given as an example.…”
    Get full text
    Article
  20. 220

    Chaotic Sequence Cipher Algorithm Based on Discrete Anti-control by ZHAO Geng, LI Wen-jian, MA Ying-jie

    Published 2022-04-01
    Subjects: “…anti-control|lyapunov exponent|chaotic system|sequence cipher…”
    Get full text
    Article