Academic literature on the topic 'Polyalphabetic substitution cipher'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Polyalphabetic substitution cipher.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Polyalphabetic substitution cipher"
Astuti, Lestari Fidi, Kiswara Agung Santoso, and Ahmad Kamsyakawuni. "PENGAMANAN POLYALPHABETIC DENGAN AFFINE CIPHER BERDASARKAN BARISAN FIBONACCI." Majalah Ilmiah Matematika dan Statistika 19, no. 2 (2019): 95. http://dx.doi.org/10.19184/mims.v19i2.17274.
Full textAgustini, Siti, Weny Mistarika Rahmawati, and Muchamad Kurniawan. "Modified Vegenere Cipher to Enhance Data Security Using Monoalphabetic Cipher." International Journal of Artificial Intelligence & Robotics (IJAIR) 1, no. 1 (2019): 25. http://dx.doi.org/10.25139/ijair.v1i1.2029.
Full textKartha, Ranju S., and Varghese Paul. "Polyalphabetic Substitution Cipher Using Multiple Random Table." International Journal of Computer Sciences and Engineering 6, no. 5 (2018): 51–58. http://dx.doi.org/10.26438/ijcse/v6i5.5158.
Full textBasheer, Ghusoon. "Application of Polyalphabetic Substitution Cipher using Genetic Algorithm." AL-Rafidain Journal of Computer Sciences and Mathematics 5, no. 1 (2008): 57–68. http://dx.doi.org/10.33899/csmj.2008.163949.
Full textSom, Sukalyan, and Sabyasachi Ghosh. "A Simple Algebraic Model based Polyalphabetic Substitution Cipher." International Journal of Computer Applications 39, no. 8 (2012): 53–56. http://dx.doi.org/10.5120/4844-7111.
Full textIbraheem, Noor, and Mokhtar Hasan. "Combining Several Substitution Cipher Algorithms using Circular Queue Data Structure." Baghdad Science Journal 17, no. 4 (2020): 1320. http://dx.doi.org/10.21123/bsj.2020.17.4.1320.
Full textClark, Andrew, and Ed Dawson. "A PARALLEL GENETIC ALGORITHM FOR CRYPTANALYSIS OF THE POLYALPHABETIC SUBSTITUTION CIPHER." Cryptologia 21, no. 2 (1997): 129–38. http://dx.doi.org/10.1080/0161-119791885850.
Full textHoa, Nguyen Huu, Dang Quach Gia Binh, Do Yeong Kim, Young Namgoong та Si Choon Noh. "Vigenere 테이블을 이용한 3단계 다중 알파벳 치환 암호화 모델". Jouranl of Information and Security 22, № 3 (2022): 33–39. http://dx.doi.org/10.33778/kcsa.2022.22.3.033.
Full textImam Riadi, Abdul Fadlil, and Fahmi Auliya Tsani. "Pengamanan Citra Digital Berbasis Kriptografi Menggunakan Algoritma Vigenere Cipher." JISKA (Jurnal Informatika Sunan Kalijaga) 7, no. 1 (2022): 33–45. http://dx.doi.org/10.14421/jiska.2022.7.1.33-45.
Full textKravchenko, Oleksandr. "GENERAL TECHNOLOGY OF ENCRYPTION AND INTEGRATION OF DATA IN A PATTERN OF A PICTURE OF IMAGES THAT IS RESISTANT TO JPEG COMPRESSION." Bulletin of the National Technical University "KhPI". Series: Innovation researches in students’ scientific work, no. 2 (December 16, 2021): 22–28. http://dx.doi.org/10.20998/2220-4784.2021.02.04.
Full textDissertations / Theses on the topic "Polyalphabetic substitution cipher"
Clark, Andrew J. "Optimisation heuristics for cryptology." Thesis, Queensland University of Technology, 1998. https://eprints.qut.edu.au/15777/1/Andrew_Clark_Thesis.pdf.
Full textClark, Andrew J. "Optimisation Heuristics for Cryptology." Queensland University of Technology, 1998. http://eprints.qut.edu.au/15777/.
Full textBook chapters on the topic "Polyalphabetic substitution cipher"
Varghese, Prabha Elizabeth, and Latha R. Nair. "Randomizing Vigenere Cipher in Polyalphabetic Substitution Scheme." In International Conference on Intelligent Computing and Smart Communication 2019. Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-15-0633-8_80.
Full textSalomon, David. "Polyalphabetic Substitution Ciphers." In Data Privacy and Security. Springer New York, 2003. http://dx.doi.org/10.1007/978-0-387-21707-9_4.
Full textNeuenschwander, Daniel. "1 Classical Polyalphabetic Substitution Ciphers." In Probabilistic and Statistical Methods in Cryptology. Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-25942-8_2.
Full text"Polyalphabetic Substitution Ciphers." In The Mathematics of Secrets. Princeton University Press, 2018. http://dx.doi.org/10.2307/j.ctvc775xv.6.
Full text"Polyalphabetic Substitution Ciphers." In Cryptological Mathematics. American Mathematical Society, 2000. http://dx.doi.org/10.1090/clrm/016/02.
Full text"2. Polyalphabetic Substitution Ciphers." In The Mathematics of Secrets. Princeton University Press, 2017. http://dx.doi.org/10.1515/9781400885626-004.
Full text"2. Polyalphabetic Substitution Ciphers." In The Mathematics of Secrets. Princeton University Press, 2018. http://dx.doi.org/10.1515/9780691184555-004.
Full text