-
201
-
202
-
203
-
204
-
205
-
206
-
207
The German enigma cipher machine : beginnings, success, and ultimate failure /
Published 2005Subjects: “…Enigma cipher system…”
-
208
Implementation of hybrid encryption method using caesar cipher algorithm
Published 2010“…For that matter, encryption method known as Caesar cipher, one of the simplest and most widely used encryption techniques. …”
Get full text
Undergraduates Project Papers -
209
Implementation of hybrid encryption method using caesar cipher algorithm
Published 2010“…In daily life,we use Internet or accessing information from various sources.Some of the procedure requires us to sending our own information.The objective of this project is to explore the way of doing encryption,improve certain aspect of the existing algorithm and to find out a way to create better security.In this project,encryption will be implemented in information on a web that makes it hard to be readable and secure.For that matter,encryption method known as Caesar cipher,one of the simplest and most widely used encryption techniques.In this encryption,it uses the substitution cipher in which each letter in the plaintext is replaced by some fixed number of position down the alphabet. …”
Get full text
Undergraduates Project Papers -
210
Security Analysis of QAM Quantum-Noise Randomized Cipher System
Published 2020-01-01Subjects: “…quantum-noise randomized cipher…”
Get full text
Article -
211
SLIM: A Lightweight Block Cipher for Internet of Health Things
Published 2020-01-01Subjects: Get full text
Article -
212
Application Of Rectangular Matrices: Affine Cipher Using Asymmetric Keys
Published 2019-06-01Subjects: “…cryptography, symmetric key algorithms, asymmetric key algorithms, affine cipher using asymmetric keys, rectangular matrices…”
Get full text
Article -
213
A Substitution Box for Lightweight Ciphers to Secure Internet of Things
Published 2023-04-01Subjects: “…Lightweight cipher…”
Get full text
Article -
214
METHOD OT DATA AND KNOWLEDGE PROCESSING IN INTERNET WITH CIPHERING SUPPORT
Published 2019-06-01“…Algorithm of queries translation for the ciphering support is modifying with unity operations for queries coding with inhomogeneous mapping on relational model. …”
Get full text
Article -
215
Meet-in-the-Middle Differential Fault Analysis on ITUbee Block Cipher
Published 2023-06-01Subjects: Get full text
Article -
216
Finding Impossible Differentials in ARX Ciphers under Weak Keys
Published 2024-03-01Subjects: Get full text
Article -
217
IMPLEMENTASI ENKRIPSI DEKRIPSI ALGORITMA AFFINE CIPHER BERBASIS ANDROID
Published 2014-11-01“…Algoritma affine cipher merupakan perkembangan dari algoritma caesar dimana algoritma affine cipher menggunakan dua kunci. …”
Get full text
Article -
218
Attack on the Simple Substitution Ciphers Using Particle Swarm Optimization
Published 2010-05-01“…It is shown that such algorithm could be usedto break the key for a simple substitution cipher. This paper presents aproposed 2-opt PSO algorithm to enhance the efficiency of PSO algorithmon attacking simple substitution ciphers.…”
Get full text
Article -
219
XSL Block Ciphers’ Key-schedules with Resistance to Differential Cryptanalysis
Published 2014-05-01“…The paper discusses the resistance of XSL block ciphers to differential cryptanalysis. AES-like block ciphers with alternative key-schedules (increased performance and density) are given as an example.…”
Get full text
Article -
220
Chaotic Sequence Cipher Algorithm Based on Discrete Anti-control
Published 2022-04-01Subjects: “…anti-control|lyapunov exponent|chaotic system|sequence cipher…”
Get full text
Article