Journal articles on the topic 'Cipher'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Cipher.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Bucholc, Krzysztof, Krzysztof Chmiel, Anna Grocholewska-Czuryło, Ewa Idzikowska, Izabela Janicka-Lipska, and Janusz Stokłosa. "Scalable PP-1 block cipher." International Journal of Applied Mathematics and Computer Science 20, no. 2 (June 1, 2010): 401–11. http://dx.doi.org/10.2478/v10006-010-0030-6.
Full textWijayanti, Dian Eka. "BEBERAPA MODIFIKASI PADA ALGORITMA KRIPTOGRAFI AFFINE CIPHER." Journal of Fundamental Mathematics and Applications (JFMA) 1, no. 2 (November 30, 2018): 64. http://dx.doi.org/10.14710/jfma.v1i2.19.
Full textPan, Yining. "The Scope of Application of Letter Frequency Analysis in Substitution Cipher." Journal of Physics: Conference Series 2386, no. 1 (December 1, 2022): 012015. http://dx.doi.org/10.1088/1742-6596/2386/1/012015.
Full textLuo, Lan, Qiong Hai Dai, Chun Xiang Xu, and Shao Quan Jiang. "An Application Study to the Ciphers Weighed in Faithful Transmission." Applied Mechanics and Materials 128-129 (October 2011): 637–41. http://dx.doi.org/10.4028/www.scientific.net/amm.128-129.637.
Full textMihaylov, Deyan. "Cryptography and Cryptanalysis in MS EXCEL." Mathematics and Informatics LXV, no. 1 (February 28, 2022): 53–71. http://dx.doi.org/10.53656/math2022-1-4-kri.
Full textHaryono, Wasis. "Comparison Encryption of How to Work Caesar Cipher, Hill Cipher, Blowfish and Twofish." Data Science: Journal of Computing and Applied Informatics 4, no. 2 (July 31, 2020): 100–110. http://dx.doi.org/10.32734/jocai.v4.i2-4004.
Full textSavla, Dhairya, and Prof Ruchi Rautela. "Design and Improvement of Caesar Cipher." International Journal for Research in Applied Science and Engineering Technology 11, no. 7 (July 31, 2023): 1190–94. http://dx.doi.org/10.22214/ijraset.2023.54819.
Full textGhorai, Shreyasi, Nilanjan Datta, and Mrinal Nandi. "ULBC: An Ultra Light-weight Block Cipher." Journal of Advances in Mathematics and Computer Science 38, no. 8 (June 23, 2023): 86–100. http://dx.doi.org/10.9734/jamcs/2023/v38i81793.
Full textWu, Shyi-Tsong. "A Key-Based Multi-Mode Clock-Controlled Stream Cipher for Real-Time Secure Communications of IoT." Electronics 12, no. 5 (February 21, 2023): 1076. http://dx.doi.org/10.3390/electronics12051076.
Full textDwivedi, Ashutosh Dhar. "BRISK: Dynamic Encryption Based Cipher for Long Term Security." Sensors 21, no. 17 (August 26, 2021): 5744. http://dx.doi.org/10.3390/s21175744.
Full textMulhem, Saleh, and Wael Adi. "New Mathblocks-Based Feistel-Like Ciphers for Creating Clone-Resistant FPGA Devices." Cryptography 3, no. 4 (December 17, 2019): 28. http://dx.doi.org/10.3390/cryptography3040028.
Full textIbrahim, Nahla, and Johnson Agbinya. "Design of a Lightweight Cryptographic Scheme for Resource-Constrained Internet of Things Devices." Applied Sciences 13, no. 7 (March 30, 2023): 4398. http://dx.doi.org/10.3390/app13074398.
Full textRatseev, S. M. "ON PERFECT IMITATION RESISTANT CIPHERS OF SUBSTITUTION WITH UNBOUNDED KEY." Vestnik of Samara University. Natural Science Series 19, no. 9.1 (June 5, 2017): 42–48. http://dx.doi.org/10.18287/2541-7525-2013-19-9.1-42-48.
Full textSayyed, Karishma Shaukat, Prof S. R. Ganolkar, and Prof S. O. Rajankar. "FPGA Implementation of Rectangle Lightweight Block Cipher." International Journal for Research in Applied Science and Engineering Technology 10, no. 5 (May 31, 2022): 2426–33. http://dx.doi.org/10.22214/ijraset.2022.42143.
Full textAgustini, Siti, Weny Mistarika Rahmawati, and Muchamad Kurniawan. "Modified Vegenere Cipher to Enhance Data Security Using Monoalphabetic Cipher." International Journal of Artificial Intelligence & Robotics (IJAIR) 1, no. 1 (October 31, 2019): 25. http://dx.doi.org/10.25139/ijair.v1i1.2029.
Full textFadhil Jasim, Khalid, and Imad Fakhri Al-Shaikhli. "Analysis the Components of SNOW 3G and ZUC Ciphers in Mobile Systems." International Journal of Engineering & Technology 7, no. 4.15 (October 7, 2018): 519. http://dx.doi.org/10.14419/ijet.v7i4.15.26324.
Full textJang, Kyungbae, Gyeongju Song, Hyunjun Kim, Hyeokdong Kwon, Hyunji Kim, and Hwajeong Seo. "Efficient Implementation of PRESENT and GIFT on Quantum Computers." Applied Sciences 11, no. 11 (May 23, 2021): 4776. http://dx.doi.org/10.3390/app11114776.
Full textRaddum, Håvard, and Marek Sýs. "The zodiac killer ciphers." Tatra Mountains Mathematical Publications 45, no. 1 (December 1, 2010): 75–91. http://dx.doi.org/10.2478/v10127-010-0007-8.
Full textMishra, Girish, Indivar Gupta, S. V. S. S. N. V. G. Krishna Murthy, and S. K. Pal. "Deep Learning based Cryptanalysis of Stream Ciphers." Defence Science Journal 71, no. 4 (July 1, 2021): 499–506. http://dx.doi.org/10.14429/dsj.71.16209.
Full textBandjur, Milos. "Novel method of discrete message ciphering with equal length of message and cryptogram." Facta universitatis - series: Electronics and Energetics 16, no. 2 (2003): 251–58. http://dx.doi.org/10.2298/fuee0302251b.
Full textHieu, Minh Nguyen, Duy Ho Ngoc, Canh Hoang Ngoc, Trung Dinh Phuong, and Manh Tran Cong. "New primitives of controlled elements F2/4 for block ciphers." International Journal of Electrical and Computer Engineering (IJECE) 10, no. 5 (October 1, 2020): 5470. http://dx.doi.org/10.11591/ijece.v10i5.pp5470-5478.
Full textKim, Bohun, Junghoon Cho, Byungjun Choi, Jongsun Park, and Hwajeong Seo. "Compact Implementations of HIGHT Block Cipher on IoT Platforms." Security and Communication Networks 2019 (December 31, 2019): 1–10. http://dx.doi.org/10.1155/2019/5323578.
Full textAnanth, Raghavendra, Panduranga Rao Malode Vishwanatha Rao, and Narayana Swamy Ramaiah. "An efficient Grain-80 stream cipher with unrolling features to enhance the throughput on hardware platform." Indonesian Journal of Electrical Engineering and Computer Science 33, no. 1 (January 1, 2024): 218. http://dx.doi.org/10.11591/ijeecs.v33.i1.pp218-226.
Full textAntal, Eugen, and Viliam Hromada. "A NEW STREAM CIPHER BASED ON FIALKA M-125." Tatra Mountains Mathematical Publications 57, no. 1 (November 1, 2013): 101–18. http://dx.doi.org/10.2478/tmmp-2013-0038.
Full textAltamimi, Ammar Sabeeh Hmoud, and Ali Mohsin Kaittan. "A Proposed Arabic Text Encryption Method Using Multiple Ciphers." Webology 18, Special Issue 04 (September 30, 2021): 319–26. http://dx.doi.org/10.14704/web/v18si04/web18131.
Full textYerukala, Nagendar, V. Kamakshi Prasad, and Allam Apparao. "Performance and Statistical Analysis of Stream ciphers in GSM Communications." Journal of communications software and systems 16, no. 1 (March 15, 2020): 11–18. http://dx.doi.org/10.24138/jcomss.v16i1.892.
Full textAlekseychuk, A. N., and S. M. Ignatenko. "Algorithms for evaluation of the SNOW 2.0-like stream ciphers security over residue rings against correlation attacks." Radiotekhnika, no. 193 (May 15, 2018): 28–34. http://dx.doi.org/10.30837/rt.2018.2.193.03.
Full textIrawan, Muhammad Dedi. "IMPLEMENTASI KRIPTOGRAFI VIGENERE CIPHER DENGAN PHP." JURNAL TEKNOLOGI INFORMASI 1, no. 1 (June 1, 2017): 11. http://dx.doi.org/10.36294/jurti.v1i1.21.
Full textHeys, Howard M. "Statistical Cipher Feedback of Stream Ciphers." Computer Journal 60, no. 12 (July 13, 2017): 1839–51. http://dx.doi.org/10.1093/comjnl/bxx068.
Full textPark, Seonghwan, Hyunil Kim, and Inkyu Moon. "Automated Classical Cipher Emulation Attacks via Unified Unsupervised Generative Adversarial Networks." Cryptography 7, no. 3 (July 11, 2023): 35. http://dx.doi.org/10.3390/cryptography7030035.
Full textNawaz, Yasir, and Lei Wang. "Block Cipher in the Ideal Cipher Model: A Dedicated Permutation Modeled as a Black-Box Public Random Permutation." Symmetry 11, no. 12 (December 5, 2019): 1485. http://dx.doi.org/10.3390/sym11121485.
Full textChain, Kai. "The security analysis on the rabbit stream cipher." International Journal on Information Technologies and Security 16, no. 2 (June 1, 2024): 91–102. http://dx.doi.org/10.59035/swyf4934.
Full textFORMOLO, DANIEL, LUIZ P. L. DE OLIVEIRA, and MARCELO SOBOTTKA. "A COMPETITIVE SEARCHING-BASED CHAOTIC CIPHER." International Journal of Modern Physics C 21, no. 11 (November 2010): 1377–90. http://dx.doi.org/10.1142/s0129183110015907.
Full textRatseev, S. M., and V. M. Ratseev. "ON PERFECT IMITATION RESISTANT CIPHERS BASED ON COMBINATORIAL OBJECTS." Vestnik of Samara University. Natural Science Series 22, no. 1-2 (April 24, 2017): 46–50. http://dx.doi.org/10.18287/2541-7525-2016-22-1-2-46-50.
Full textAl-Daraiseh, Ahmad, Yousef Sanjalawe, Salam Fraihat, and Salam Al-E’mari. "Novel, Fast, Strong, and Parallel: A Colored Image Cipher Based on SBTM CPRNG." Symmetry 16, no. 5 (May 10, 2024): 593. http://dx.doi.org/10.3390/sym16050593.
Full textDin, Maiya, Saibal K. Pal, S. K. Muttoo, and Sushila Madan. "A Hybrid Computational Intelligence based Technique for Automatic Cryptanalysis of Playfair Ciphers." Defence Science Journal 70, no. 6 (October 12, 2020): 612–18. http://dx.doi.org/10.14429/dsj.70.15749.
Full textPurwanti, Saputra Dwi Nurcahya, and Dian Nazelliana. "Message Security in Classical Cryptography Using the Vigenere Cipher Method." International Journal Software Engineering and Computer Science (IJSECS) 4, no. 1 (April 30, 2024): 350–57. http://dx.doi.org/10.35870/ijsecs.v4i1.2263.
Full textZhang, Ping, and Qian Yuan. "Minimizing Key Materials: The Even–Mansour Cipher Revisited and Its Application to Lightweight Authenticated Encryption." Security and Communication Networks 2020 (March 10, 2020): 1–6. http://dx.doi.org/10.1155/2020/4180139.
Full textNoever, David. "LARGE LANGUAGE MODELS FOR CIPHERS." International Journal of Artificial Intelligence & Applications 14, no. 03 (May 28, 2023): 1–20. http://dx.doi.org/10.5121/ijaia.2023.14301.
Full textAragona, Riccardo, Marco Calderini, Antonio Tortora, and Maria Tota. "Primitivity of PRESENT and other lightweight ciphers." Journal of Algebra and Its Applications 17, no. 06 (May 23, 2018): 1850115. http://dx.doi.org/10.1142/s0219498818501153.
Full textSahu, Harish Kumar, Vikas Jadhav, Shefali Sonavane, and R. K. Sharma. "Cryptanalytic Attacks on IDEA Block Cipher." Defence Science Journal 66, no. 6 (October 31, 2016): 582. http://dx.doi.org/10.14429/dsj.66.10798.
Full textLysytska, Iryna, Kostiantyn Lysytskyi, Oleksii Nariezhnii, and Tetiana Hrinenko. "The influence of S-boxes on the arrival of the cipher to the state of random substitution." Radioelectronic and Computer Systems, no. 3 (September 29, 2023): 150–58. http://dx.doi.org/10.32620/reks.2023.3.12.
Full textMatheis, Kenneth, Rainer Steinwandt, and Adriana Suárez Suárez Corona. "Algebraic Properties of the Block Cipher DESL." Symmetry 11, no. 11 (November 15, 2019): 1411. http://dx.doi.org/10.3390/sym11111411.
Full textJang, Kyungbae, Gyeongju Song, Hyeokdong Kwon, Siwoo Uhm, Hyunji Kim, Wai-Kong Lee, and Hwajeong Seo. "Grover on PIPO." Electronics 10, no. 10 (May 17, 2021): 1194. http://dx.doi.org/10.3390/electronics10101194.
Full textTran Thi, Luong. "PROVING THE SECURITY OF AES BLOCK CIPHER BASED ON MODIFIED MIXCOLUMN." Journal of Computer Science and Cybernetics 40, no. 2 (June 10, 2024): 187–203. http://dx.doi.org/10.15625/1813-9663/18058.
Full textSoboń, Artur, Miroslaw Kurkowski, and Sylwia Stachowiak. "Complete SAT based Cryptanalysis of RC5 Cipher." Journal of information and organizational sciences 44, no. 2 (December 9, 2020): 365–82. http://dx.doi.org/10.31341/jios.44.2.10.
Full textLiu, Yuansheng, Hua Fan, Eric Yong Xie, Ge Cheng, and Chengqing Li. "Deciphering an Image Cipher Based on Mixed Transformed Logistic Maps." International Journal of Bifurcation and Chaos 25, no. 13 (December 15, 2015): 1550188. http://dx.doi.org/10.1142/s0218127415501886.
Full textJayanti, Sravani, K. Chittibabu, and Chandra Sekhar Akkapeddi. "A Cryptosystem of Skewed Affine Cipher of Multiple Keys." ECS Transactions 107, no. 1 (April 24, 2022): 15071–80. http://dx.doi.org/10.1149/10701.15071ecst.
Full textRizk-Allah, Rizk M., Hatem Abdulkader, Samah S. Abd Elatif, Wail S. Elkilani, Eslam Al Maghayreh, Habib Dhahri, and Awais Mahmood. "A Novel Binary Hybrid PSO-EO Algorithm for Cryptanalysis of Internal State of RC4 Cipher." Sensors 22, no. 10 (May 19, 2022): 3844. http://dx.doi.org/10.3390/s22103844.
Full textMujaddid, Azzam, and Sumarsono Sumarsono. "A Modifying of Hill Cipher Algorithm with 3 Substitution Caesar Cipher." Proceeding International Conference on Science and Engineering 1 (October 31, 2017): 157–63. http://dx.doi.org/10.14421/icse.v1.294.
Full text