Showing 281 - 300 results of 2,263 for search '"cipher"', query time: 0.13s Refine Results
  1. 281
  2. 282

    Implementasi Algoritma Affine Cipher untuk Keamanan Data Teks by Nurjamiyah Nurjamiyah

    Published 2020-09-01
    “…One way to store data sent via email is to use cryptography. The Affine Cipher is an extension of the Caesar Cipher which multiplies the plaintext by a value and adds a shift. …”
    Get full text
    Article
  3. 283
  4. 284
  5. 285

    Hardware Implementation Of Rc4a Stream Cipher Algorithm by Al Noman, Abdullah

    Published 2007
    “…The implementation is able to support variable key lengths from 8 bits up to 512 bits. Unlike other stream ciphers, the proposed implementation generates two output streams at a time, whereas others generate only one output stream. …”
    Get full text
    Thesis
  6. 286

    Development of DNA-based dynamic key-dependent block cipher by Saeed, Auday H.

    Published 2015
    “…It was confirmed that the DNAB cipher had successfully passed very demanding security analyses and justified that the DNAB cipher is a secure block-cipher. …”
    Get full text
    Thesis
  7. 287
  8. 288
  9. 289

    Clonal selection algorithm for the cryptanalysis of a simple substitution cipher by Ahmad, Badrisham, Maarof, Mohd. Aizaini, Ibrahim, Subariah, Kutty Mammi, Hazinah, Mohamed Amin, Muhalim, Z'aba, Muhammad Reza

    Published 2006
    “…In this paper CSA is used to cryptanalyse a simple substitution cipher, whereby the key used to encrypt the plaintext is searched. …”
    Conference or Workshop Item
  10. 290

    Design and implementation of lightweight encryption algorithm using prince cipher by Lee, Jiah Chun

    Published 2021
    “…Most of the available lightweight cryptographies are round-based designs, they are able to achieve high throughput via pipelining the round functions, however the response time is not ideal. The Prince cipher is the first lightweight block cipher developed to speed up the latency of the algorithm. …”
    Get full text
    Thesis
  11. 291

    A competitive study of cryptography techniques over block cipher by Al-Abiachi, Ashwak M., Ahmad, Faudziah, Ku-Mahamud, Ku Ruhana

    Published 2011
    “…Hence, this paper aims to describe and review the different research that has done toward text encryption and description in the block cipher. Moreover, this paper suggests a cryptography model in the block cipher.…”
    Get full text
    Conference or Workshop Item
  12. 292

    Combining Several Substitution Cipher Algorithms using Circular Queue Data Structure by Noor Ibraheem, Mokhtar Hasan

    Published 2020-12-01
    Subjects: “…Circular queue, Homophonic substitution cipher, Polyalphabetic substitution cipher, Substitution cipher…”
    Get full text
    Article
  13. 293
  14. 294
  15. 295
  16. 296
  17. 297
  18. 298

    The Design Trends of Keystream Generator for Stream Cipher for High Immunity Attacks by Mostafa, Saifuldun, Saad, Hayder, Mustafa, Musa Jaber, Ali, Mohammed Hasan, Dhafer, Karam

    Published 2016
    “…Due to the latest changes in observing the external network related threats within the stream cipher, it become necessary to address these threats in order to identify the generator suitable for avoiding such threats. …”
    Get full text
    Book Chapter
  19. 299
  20. 300

    APPLICATION OF ANT COLONY ALGORITHM FOR REALIZATION OF TRANSPOSITION CIPHERS CRYPT ANALYSIS by Vladimir A. Fatkhi, Alexander S. Sergeyev

    Published 2011-02-01
    “…Possibility of application of ant colony algorithms for realization of the transposition ciphers cryptanalysis  is studied. Its application to the plain text results in the cryptogram received by shifting symbols of the plain text in a certain order. …”
    Get full text
    Article