Journal articles on the topic 'Polyalphabetic cipher'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 32 journal articles for your research on the topic 'Polyalphabetic cipher.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Mahmudah, Muhlisatul, and Tri Novita Irawati. "Cryptosystem Polyalphabetic Cipher Application." Jurnal Axioma : Jurnal Matematika dan Pembelajaran 5, no. 1 (2020): 11–19. http://dx.doi.org/10.36835/axi.v5i1.539.
Full textAgustini, Siti, Weny Mistarika Rahmawati, and Muchamad Kurniawan. "Modified Vegenere Cipher to Enhance Data Security Using Monoalphabetic Cipher." International Journal of Artificial Intelligence & Robotics (IJAIR) 1, no. 1 (2019): 25. http://dx.doi.org/10.25139/ijair.v1i1.2029.
Full textHewage, Chaminda, Ambikesh Jayal, Glenn Jenkins, and Ryan J. Brown. "A Learned Polyalphabetic Decryption Cipher." SNE Simulation Notes Europe 28, no. 4 (2018): 141–48. http://dx.doi.org/10.11128/sne.28.tn.10441.
Full textAung, Tun Myat, Htet Htet Naing, and Ni Ni Hla. "A Complex Transformation of Monoalphabetic Cipher to Polyalphabetic Cipher: (Vigenère-Affine Cipher)." International Journal of Machine Learning and Computing 9, no. 3 (2019): 296–303. http://dx.doi.org/10.18178/ijmlc.2019.9.3.801.
Full textAstuti, Lestari Fidi, Kiswara Agung Santoso, and Ahmad Kamsyakawuni. "PENGAMANAN POLYALPHABETIC DENGAN AFFINE CIPHER BERDASARKAN BARISAN FIBONACCI." Majalah Ilmiah Matematika dan Statistika 19, no. 2 (2019): 95. http://dx.doi.org/10.19184/mims.v19i2.17274.
Full textKartha, Ranju S., and Varghese Paul. "Polyalphabetic Substitution Cipher Using Multiple Random Table." International Journal of Computer Sciences and Engineering 6, no. 5 (2018): 51–58. http://dx.doi.org/10.26438/ijcse/v6i5.5158.
Full textShao, Zehui, S. Kosari, R. Anoos, S. M. Sheikholeslami, and J. A. Dayap. "Outer-Convex Dominating Set in the Corona of Graphs as Encryption Key Generator." Complexity 2020 (October 25, 2020): 1–8. http://dx.doi.org/10.1155/2020/8316454.
Full textBasheer, Ghusoon. "Application of Polyalphabetic Substitution Cipher using Genetic Algorithm." AL-Rafidain Journal of Computer Sciences and Mathematics 5, no. 1 (2008): 57–68. http://dx.doi.org/10.33899/csmj.2008.163949.
Full textSom, Sukalyan, and Sabyasachi Ghosh. "A Simple Algebraic Model based Polyalphabetic Substitution Cipher." International Journal of Computer Applications 39, no. 8 (2012): 53–56. http://dx.doi.org/10.5120/4844-7111.
Full textPasaribu, Meliana, Yundari Yundari, and Muhammad Ilyas. "Graceful Labeling and Skolem Graceful Labeling on the U-star Graph and It’s Application in Cryptography." Jambura Journal of Mathematics 3, no. 2 (2021): 103–14. http://dx.doi.org/10.34312/jjom.v3i2.9992.
Full textPatni, Prachi. "Implementation and Result Analysis of Polyalphabetic Approach to Caesar Cipher." IOSR Journal of Computer Engineering 16, no. 4 (2014): 100–106. http://dx.doi.org/10.9790/0661-1643100106.
Full textIbraheem, Noor, and Mokhtar Hasan. "Combining Several Substitution Cipher Algorithms using Circular Queue Data Structure." Baghdad Science Journal 17, no. 4 (2020): 1320. http://dx.doi.org/10.21123/bsj.2020.17.4.1320.
Full textClark, Andrew, and Ed Dawson. "A PARALLEL GENETIC ALGORITHM FOR CRYPTANALYSIS OF THE POLYALPHABETIC SUBSTITUTION CIPHER." Cryptologia 21, no. 2 (1997): 129–38. http://dx.doi.org/10.1080/0161-119791885850.
Full textImam Riadi, Abdul Fadlil, and Fahmi Auliya Tsani. "Pengamanan Citra Digital Berbasis Kriptografi Menggunakan Algoritma Vigenere Cipher." JISKA (Jurnal Informatika Sunan Kalijaga) 7, no. 1 (2022): 33–45. http://dx.doi.org/10.14421/jiska.2022.7.1.33-45.
Full textWijaya, Angga. "Modifikasi Algoritma Kriptografi Klasik dengan Implementasi Deterministic Finite Automata melalui Partisi Pesan Asli berdasarkan Kriteria Pesan Bagian." Journal of Science and Applicative Technology 4, no. 2 (2020): 133. http://dx.doi.org/10.35472/jsat.v4i2.346.
Full textXia, Zhihua, Qiuju Ji, Qi Gu, Chengsheng Yuan, and Fengjun Xiao. "A Format-compatible Searchable Encryption Scheme for JPEG Images Using Bag-of-words." ACM Transactions on Multimedia Computing, Communications, and Applications 18, no. 3 (2022): 1–18. http://dx.doi.org/10.1145/3492705.
Full textKravchenko, Oleksandr. "GENERAL TECHNOLOGY OF ENCRYPTION AND INTEGRATION OF DATA IN A PATTERN OF A PICTURE OF IMAGES THAT IS RESISTANT TO JPEG COMPRESSION." Bulletin of the National Technical University "KhPI". Series: Innovation researches in students’ scientific work, no. 2 (December 16, 2021): 22–28. http://dx.doi.org/10.20998/2220-4784.2021.02.04.
Full textFadlil, Abdul, Imam Riadi, and Achmad Nugrahantoro. "Kombinasi Sinkronisasi Jaringan Syaraf Tiruan dan Vigenere Cipher untuk Optimasi Keamanan Informasi." Digital Zone: Jurnal Teknologi Informasi dan Komunikasi 11, no. 1 (2020): 81–95. http://dx.doi.org/10.31849/digitalzone.v11i1.3945.
Full textAbeles, Francine, and Stanley H. Lipson. "SOME VICTORIAN PERIODIC POLYALPHABETIC CIPHERS." Cryptologia 14, no. 2 (1990): 128–34. http://dx.doi.org/10.1080/0161-119091864823.
Full textCarroll, John M., and Lynda Robbins. "THE AUTOMATED CRYPTANALYSIS OF POLYALPHABETIC CIPHERS." Cryptologia 11, no. 4 (1987): 193–205. http://dx.doi.org/10.1080/0161-118791862018.
Full textCarroll, John M., and Lynda Robbins. "The automated cryptananysis of polyalphabetic ciphers." Computers & Security 7, no. 1 (1988): 104. http://dx.doi.org/10.1016/0167-4048(88)90535-4.
Full textKing, John C. "AN ALGORITHM FOR THE COMPLETE AUTOMATED CRYPTANALYSIS OF PERIODIC POLYALPHABETIC SUBSTITUTION CIPHERS." Cryptologia 18, no. 4 (1994): 332–55. http://dx.doi.org/10.1080/0161-119491882928.
Full textKaeding, Thomas. "Slippery hill-climbing technique for ciphertext-only cryptanalysis of periodic polyalphabetic substitution ciphers." Cryptologia 44, no. 3 (2019): 205–22. http://dx.doi.org/10.1080/01611194.2019.1655504.
Full textCassal-Quiroga, B. B., and E. Campos-Cantón. "Generation of Dynamical S-Boxes for Block Ciphers via Extended Logistic Map." Mathematical Problems in Engineering 2020 (March 19, 2020): 1–12. http://dx.doi.org/10.1155/2020/2702653.
Full textBoklan, Kent D. "How I deciphered a Robert E. Lee letter—and a note on the power of context in short polyalphabetic ciphers." Cryptologia 40, no. 5 (2016): 406–10. http://dx.doi.org/10.1080/01611194.2016.1170424.
Full textPermanasari, Yurika, and Erwin Harahap. "Kriptografi Polyalphabetic." Matematika 17, no. 1 (2018). http://dx.doi.org/10.29313/jmtm.v17i1.4065.
Full text"New Polyalphabetic Substitution Scheme for Secure Communication." International Journal of Innovative Technology and Exploring Engineering 9, no. 3 (2020): 3303–10. http://dx.doi.org/10.35940/ijitee.c9043.019320.
Full text"Cryptanalysis of Polyalphabetic Cipher Using Differential Evolution Algorithm." Tehnicki vjesnik - Technical Gazette 27, no. 4 (2020). http://dx.doi.org/10.17559/tv-20190314095054.
Full text"Software Analytical Method for Protecting Digital Information." International Journal of Innovative Technology and Exploring Engineering 9, no. 8 (2020): 460–63. http://dx.doi.org/10.35940/ijitee.g5675.069820.
Full text"A Binomial Crossover Based Artificial Bee Colony Algorithm for Cryptanalysis of Polyalphabetic Cipher." Tehnicki vjesnik - Technical Gazette 27, no. 6 (2020). http://dx.doi.org/10.17559/tv-20190422225110.
Full textMuhammad Aziz Fatchu Rachman, Rizqi Sukma Kharisma,. "PEMBUATAN APLIKASI NOTES MENGGUNAKAN ALGORITMA KRIPTOGRAFI POLYALPHABETIC SUBSTITUTION CIPHER KOMBINASI KODE ASCII DAN OPERASI XOR BERBASIS ANDROID." Respati 12, no. 2 (2017). http://dx.doi.org/10.35842/jtir.v12i2.176.
Full text"An enhanced approach on vigenere cipher by polyalphabetics." International Journal of Latest Trends in Engineering and Technology 8, no. 1 (2016). http://dx.doi.org/10.21172/1.81.048.
Full text