Showing 1 - 20 results of 2,263 for search '"cipher"', query time: 0.17s Refine Results
  1. 1

    KOMBINASI CAESAR CIPHER DAN REVERSE CIPHER BERDASARKAN CIPHER BLOCK CHAINING by Maulidyah Lailatun Najah, Kiswara Agung Santoso

    Published 2021-09-01
    “…The plaintext will be replaced with new plaintext resulting from a combination of Caesar Cipher and Reverse Cipher techniques. The results obtained indicate that the application of plaintext modifications to CBC can improve message security because the keys used are increasingly complex.…”
    Get full text
    Article
  2. 2

    Efektivitas Pesan Teks dengan Cipher Substitusi, Vigenere Cipher, dan Cipher Transposisi by M. Azman Maricar, Nyoman Putra Sastra

    Published 2018-03-01
    “…Dari seluruh kombinasi yang ada, seluruhnya berhasil untuk proses enkripsi dan dekripsi guna mengembalikan cipher text menjadi plain text yang asli.…”
    Get full text
    Article
  3. 3

    Attack Stream Cipher By Using Cipher System Only by K. M. Hussein

    Published 2017-09-01
    “… Attack  stream  cipher  system  , using cipher  text only  , depends on the  characteristics of  plain  teKt language  and  the randomness of  the key , that used  in encryption , without  having detailed  k.nuwh:dgt:: uf cipher algorithm by benefiting  from the balance between O's and  I' in the key to reduce the probability of key space.   …”
    Get full text
    Article
  4. 4
  5. 5

    CipherTrace: automatic detection of ciphers from execution traces by Hassanin, MA

    Published 2020
    “…The prototype we developed (CipherTrace) is based on PANDA, the architecture-neutral dynamic analysis platform. …”
    Thesis
  6. 6

    A study of caesar cipher and transposition cipher in jawi messages by Mohd Lokman, Syiham, Chuah, Chai Wen, Ab. Rahman, Nurul Hidayah Binti, A. Hamid, Isredza Rahmi Binti

    Published 2018
    “…Decryption is the reverse process of encryption. Caesar cipher and transposition cipher are two historical ciphers in cryptography. …”
    Article
  7. 7

    CipherCAD Testbed by V. Platenka, A. Mazalek

    Published 2021-06-01
    “…The CipherCAD testbed is a unique workplace for the development, design, testing, verification and teaching of the communications systems. …”
    Get full text
    Article
  8. 8
  9. 9

    On construction of perfect ciphers by Sergey M Ratseev

    Published 2014-03-01
    Subjects: “…cipher…”
    Get full text
    Article
  10. 10

    Attacks on the Firekite Cipher by Thomas Johansson, Willi Meier, Vu Nguyen

    Published 2022-09-01
    “… Firekite is a synchronous stream cipher using a pseudo-random number generator (PRNG) whose security is conjectured to rely on the hardness of the Learning Parity with Noise (LPN) problem. …”
    Get full text
    Article
  11. 11
  12. 12

    Turing, ciphers and quanta. by Ekert, A, Kay, A, Pope, J

    Published 2012
    “…Alan Turing has certainly contributed to a widespread belief that the quest for a perfect, unbreakable, cipher is a futile pursuit. The ancient art of concealing information has, in the past, been matched by the ingenuity of code-breakers, but no longer! …”
    Journal article
  13. 13

    One Algorithm to Cipher Messages in Columnar and Fixed Period-d Transposition Cipher by J.N. Jassim, H. J. Muhsen

    Published 2017-08-01
    “…     One of ciphering systems depends on transposition of letters in plain text to generate cipher text. …”
    Get full text
    Article
  14. 14
  15. 15
  16. 16

    CipherTrace: automatic detection of ciphers from execution traces to neutralize ransomware by Hassanin, MA, Martinovic, I

    Published 2024
    “…Our results show that CipherTrace is capable of fully dissecting Fixed S-Box block ciphers (e.g. …”
    Journal article
  17. 17
  18. 18

    PERBANDINGAN PLAYFAIR CIPHER DENGAN 3D PLAYFAIR CIPHER PADA PENGAMANAN CITRA by Rika Ayu Sukmawati, Abduh Riski, Ahmad Kamsyakawuni

    Published 2021-03-01
    “…This research is to secure the message on image encoding using Playfair Cipher and 3D Playfair Cipher. The process of encryption and decryption on Playfair Cipher uses two-letter pairs (bigram), while in 3D Playfair Cipher uses three-letter pairs (trigrams). …”
    Get full text
    Article
  19. 19
  20. 20