Academic literature on the topic 'Cipher'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Cipher.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Cipher"
Bucholc, Krzysztof, Krzysztof Chmiel, Anna Grocholewska-Czuryło, Ewa Idzikowska, Izabela Janicka-Lipska, and Janusz Stokłosa. "Scalable PP-1 block cipher." International Journal of Applied Mathematics and Computer Science 20, no. 2 (June 1, 2010): 401–11. http://dx.doi.org/10.2478/v10006-010-0030-6.
Full textWijayanti, Dian Eka. "BEBERAPA MODIFIKASI PADA ALGORITMA KRIPTOGRAFI AFFINE CIPHER." Journal of Fundamental Mathematics and Applications (JFMA) 1, no. 2 (November 30, 2018): 64. http://dx.doi.org/10.14710/jfma.v1i2.19.
Full textPan, Yining. "The Scope of Application of Letter Frequency Analysis in Substitution Cipher." Journal of Physics: Conference Series 2386, no. 1 (December 1, 2022): 012015. http://dx.doi.org/10.1088/1742-6596/2386/1/012015.
Full textLuo, Lan, Qiong Hai Dai, Chun Xiang Xu, and Shao Quan Jiang. "An Application Study to the Ciphers Weighed in Faithful Transmission." Applied Mechanics and Materials 128-129 (October 2011): 637–41. http://dx.doi.org/10.4028/www.scientific.net/amm.128-129.637.
Full textMihaylov, Deyan. "Cryptography and Cryptanalysis in MS EXCEL." Mathematics and Informatics LXV, no. 1 (February 28, 2022): 53–71. http://dx.doi.org/10.53656/math2022-1-4-kri.
Full textHaryono, Wasis. "Comparison Encryption of How to Work Caesar Cipher, Hill Cipher, Blowfish and Twofish." Data Science: Journal of Computing and Applied Informatics 4, no. 2 (July 31, 2020): 100–110. http://dx.doi.org/10.32734/jocai.v4.i2-4004.
Full textSavla, Dhairya, and Prof Ruchi Rautela. "Design and Improvement of Caesar Cipher." International Journal for Research in Applied Science and Engineering Technology 11, no. 7 (July 31, 2023): 1190–94. http://dx.doi.org/10.22214/ijraset.2023.54819.
Full textGhorai, Shreyasi, Nilanjan Datta, and Mrinal Nandi. "ULBC: An Ultra Light-weight Block Cipher." Journal of Advances in Mathematics and Computer Science 38, no. 8 (June 23, 2023): 86–100. http://dx.doi.org/10.9734/jamcs/2023/v38i81793.
Full textWu, Shyi-Tsong. "A Key-Based Multi-Mode Clock-Controlled Stream Cipher for Real-Time Secure Communications of IoT." Electronics 12, no. 5 (February 21, 2023): 1076. http://dx.doi.org/10.3390/electronics12051076.
Full textDwivedi, Ashutosh Dhar. "BRISK: Dynamic Encryption Based Cipher for Long Term Security." Sensors 21, no. 17 (August 26, 2021): 5744. http://dx.doi.org/10.3390/s21175744.
Full textDissertations / Theses on the topic "Cipher"
Torre, Gabrielle-Ann. "Cipher." Thesis, The University of Arizona, 2014. http://hdl.handle.net/10150/322065.
Full textAghaee, Saeed. "Random Stream Cipher." Thesis, Växjö University, School of Mathematics and Systems Engineering, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:vxu:diva-1511.
Full textStream ciphers are counted as an important part of symmetric encryption method. Their basic idea comes from One-Time-Pad cipher using XOR operator on the plain text and the key to generate the cipher. The present work brings a new idea in symmetric encryption method, which inherits stream key generation idea from synchronous stream cipher and uses division instead of xoring. The Usage of division to combine the plain text with stream key gives numerous abilities to this method that the most important one is using random factors to produce the ciphers.
Raunig, Gerald. "Cipher and Dividuality." Universität Leipzig, 2020. https://ul.qucosa.de/id/qucosa%3A71582.
Full textNolan, Eric. "Chuck Chonson American cipher /." [Gainesville, Fla.]: University of Florida, 2003. http://purl.fcla.edu/fcla/etd/UFE0000759.
Full textAlhamdan, Ali Abdulaziz. "Secure stream cipher initialisation processes." Thesis, Queensland University of Technology, 2014. https://eprints.qut.edu.au/66721/1/Ali%20Abdulaziz%20H_Al%20Hamdan_Thesis.pdf.
Full textBose, Gourav. "The 128-bit block cipher MARS." FIU Digital Commons, 2003. http://digitalcommons.fiu.edu/etd/1770.
Full textXu, Jinzhong. "Stream Cipher Analysis Based on FCSRs." UKnowledge, 2000. http://uknowledge.uky.edu/gradschool_diss/320.
Full textFarmani, Mohammad. "Threshold Implementations of the Present Cipher." Digital WPI, 2017. https://digitalcommons.wpi.edu/etd-theses/1024.
Full textMcKague, Matthew. "Design and Analysis of RC4-like Stream Ciphers." Thesis, University of Waterloo, 2005. http://hdl.handle.net/10012/1141.
Full textYilmaz, Erdem. "Two Versions Of The Stream Cipher Snow." Master's thesis, METU, 2004. http://etd.lib.metu.edu.tr/upload/12605592/index.pdf.
Full textguess-and-determine attack&rdquo
s by Hawkes and Rose and the &ldquo
distinguishing attack&rdquo
by Coppersmith, Halevi and Jutla in 2002. A review of the distinguishing attack on SNOW1.0 is given using the approach made by the designers of SNOW in 2002 on another cipher, SOBER-t32. However, since the calculation methods for the complexities of the attack are different, the values found with the method of the designers of SNOW are higher than the ones found by Coppersmith, Halevi and Jutla. The correlations in the finite state machine that make the distinguishing attack possible and how these correlations are affected by the operations in the finite state machine are investigated. Since the substitution boxes (S-boxes) play an important role in destroying the correlation and linearity caused by Linear Feedback Shift Register, the s-boxes of the two versions of SNOW are examined for the criteria of Linear Approximation Table (LAT), Difference Distribution Table (DDT) and Auto-correlation Table distributions. The randomness tests are performed using NIST statistical test suite for both of the ciphers. The results of the tests are presented.
Books on the topic "Cipher"
Freemasons, Grand Lodge A. F. &. A. M. of Missouri Committee on Ritual of Missouri. Missouri cipher. Missouri: The Committee, 1991.
Find full textFreemasons. Grand Lodge of California., ed. California cipher. San Francisco, Calif: Grand Lodge of California, F. & A.M., 1990.
Find full textBook chapters on the topic "Cipher"
Mileva, Aleksandra, Vesna Dimitrova, Orhun Kara, and Miodrag J. Mihaljević. "Catalog and Illustrative Examples of Lightweight Cryptographic Primitives." In Security of Ubiquitous Computing Systems, 21–47. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-10591-4_2.
Full textStern, Jacques, and Serge Vaudenay. "CS-Cipher." In Fast Software Encryption, 189–204. Berlin, Heidelberg: Springer Berlin Heidelberg, 1998. http://dx.doi.org/10.1007/3-540-69710-1_13.
Full textWeik, Martin H. "substitution cipher." In Computer Science and Communications Dictionary, 1684. Boston, MA: Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_18510.
Full textWeik, Martin H. "transposition cipher." In Computer Science and Communications Dictionary, 1832. Boston, MA: Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_20080.
Full textTyers, Ben. "Substitution Cipher." In GameMaker: Studio 100 Programming Challenges, 49–50. Berkeley, CA: Apress, 2017. http://dx.doi.org/10.1007/978-1-4842-2644-5_25.
Full textBauer, Friedrich L. "Cæsar Cipher." In Encyclopedia of Cryptography and Security, 180. Boston, MA: Springer US, 2011. http://dx.doi.org/10.1007/978-1-4419-5906-5_162.
Full textBauer, Friedrich L. "Playfair Cipher." In Encyclopedia of Cryptography and Security, 941. Boston, MA: Springer US, 2011. http://dx.doi.org/10.1007/978-1-4419-5906-5_172.
Full textBauer, Friedrich L. "Vernam Cipher." In Encyclopedia of Cryptography and Security, 1359–60. Boston, MA: Springer US, 2011. http://dx.doi.org/10.1007/978-1-4419-5906-5_177.
Full textCanteaut, Anne. "Stream Cipher." In Encyclopedia of Cryptography and Security, 1263–65. Boston, MA: Springer US, 2011. http://dx.doi.org/10.1007/978-1-4419-5906-5_374.
Full textBiryukov, Alex. "Feistel Cipher." In Encyclopedia of Cryptography and Security, 455. Boston, MA: Springer US, 2011. http://dx.doi.org/10.1007/978-1-4419-5906-5_577.
Full textConference papers on the topic "Cipher"
Carvalho, Gabriel Cardoso de, Tertuliano Souza Neto, and Thiago do Rêgo Sousa. "Automated security proof of SQUARE, LED and CLEFIA using the MILP technique." In Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais. Sociedade Brasileira de Computação - SBC, 2023. http://dx.doi.org/10.5753/sbseg.2023.232871.
Full textNakahara Jr, Jorge. "On the Design of IDEA-128." In Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais. Sociedade Brasileira de Computação - SBC, 2005. http://dx.doi.org/10.5753/sbseg.2005.21520.
Full textBorodzhieva, Adriana. "MATLAB-BASED SOFTWARE TOOL FOR IMPLEMENTATION OF TRIFID CIPHERS USING 64-SYMBOL ALPHABET." In eLSE 2017. Carol I National Defence University Publishing House, 2017. http://dx.doi.org/10.12753/2066-026x-17-050.
Full textFreitas, Daniel Santana de, and Jorge Nakahara Jr. "χ2 Attacks on Block-Cipher based Compression Functions." In Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais. Sociedade Brasileira de Computação - SBC, 2012. http://dx.doi.org/10.5753/sbseg.2012.20538.
Full textCoutinho, Murilo, Iago Passos, and Fábio Borges. "The design and implementation of XForró14-Poly1305: a new Authenticated Encryption Scheme." In Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais. Sociedade Brasileira de Computação - SBC, 2023. http://dx.doi.org/10.5753/sbseg.2023.232879.
Full textCarrijo, José, Anderson C. A. Nascimento, Rafael Tonicelli, and Vinícius de Morais Alves. "Fault Attacks against a Cellular Automata Based Stream Cipher." In Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais. Sociedade Brasileira de Computação - SBC, 2011. http://dx.doi.org/10.5753/sbseg.2011.20565.
Full textFadhil Jasim, Khalid, Mohammad Hussein Shukur, Abdullah Abdulabbas Nahi Alrabeeah, and Laith R. Fleih. "ANALYSIS THE SECURITY OF SOME CIPHERS IN INDUSTRIAL APPLICATIONS OF WIRELESS SENSORS NETWORKS." In 4th International Conference on Communication Engineering and Computer Science (CIC-COCOS’2022). Cihan University, 2022. http://dx.doi.org/10.24086/cocos2022/paper.513.
Full textRodrigues, Félix Carvalho, Ricardo Dahab, Julio López, Hayato Fujii, and Ana Clara Zoppi Serpa. "A Minimal White-Box Dedicated Cipher Proposal Using Incompressible Lookup Tables: Space-Hard AES." In Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais. Sociedade Brasileira de Computação - SBC, 2023. http://dx.doi.org/10.5753/sbseg.2023.233113.
Full textFreitas, Daniel Santana de, and Jorge Nakahara Jr. "Impossible-Differential Attacks on block-cipher based Hash and Compression Functions using 3D and Whirlpool." In Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais. Sociedade Brasileira de Computação - SBC, 2012. http://dx.doi.org/10.5753/sbseg.2012.20539.
Full textZaman, J. K. M. Sadique Uz, and Sahar Ali Laskar. "RSA Cryptosystem: Block Cipher or Stream Cipher." In 2023 4th International Conference on Computing and Communication Systems (I3CS). IEEE, 2023. http://dx.doi.org/10.1109/i3cs58314.2023.10127232.
Full textReports on the topic "Cipher"
Popov, A. Prohibiting RC4 Cipher Suites. RFC Editor, February 2015. http://dx.doi.org/10.17487/rfc7465.
Full textShaw, D. The Camellia Cipher in OpenPGP. RFC Editor, June 2009. http://dx.doi.org/10.17487/rfc5581.
Full textKato, A., M. Kanda, and S. Kanno. Camellia Cipher Suites for TLS. RFC Editor, June 2010. http://dx.doi.org/10.17487/rfc5932.
Full textPereira, R., and R. Adams. The ESP CBC-Mode Cipher Algorithms. RFC Editor, November 1998. http://dx.doi.org/10.17487/rfc2451.
Full textAltman, J. Telnet Encryption: DES3 64 bit Cipher Feedback. RFC Editor, September 2000. http://dx.doi.org/10.17487/rfc2947.
Full textTs'o, T. Telnet Encryption: DES 64 bit Cipher Feedback. RFC Editor, September 2000. http://dx.doi.org/10.17487/rfc2952.
Full textStrombergson, J., and S. Josefsson. Test Vectors for the Stream Cipher RC4. RFC Editor, May 2011. http://dx.doi.org/10.17487/rfc6229.
Full textDolmatov, V., ed. GOST R 34.12-2015: Block Cipher "Kuznyechik". RFC Editor, March 2016. http://dx.doi.org/10.17487/rfc7801.
Full textBaryshkov, D. GOST R 34.12-2015: Block Cipher "Magma". Edited by V. Dolmatov. RFC Editor, September 2020. http://dx.doi.org/10.17487/rfc8891.
Full textDworkin, M. J. Recommendation for block cipher modes of operation :. Gaithersburg, MD: National Institute of Standards and Technology, 2001. http://dx.doi.org/10.6028/nist.sp.800-38a.
Full text