Journal articles on the topic 'Polyalphabetic substitution cipher'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 17 journal articles for your research on the topic 'Polyalphabetic substitution cipher.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Astuti, Lestari Fidi, Kiswara Agung Santoso, and Ahmad Kamsyakawuni. "PENGAMANAN POLYALPHABETIC DENGAN AFFINE CIPHER BERDASARKAN BARISAN FIBONACCI." Majalah Ilmiah Matematika dan Statistika 19, no. 2 (2019): 95. http://dx.doi.org/10.19184/mims.v19i2.17274.
Full textAgustini, Siti, Weny Mistarika Rahmawati, and Muchamad Kurniawan. "Modified Vegenere Cipher to Enhance Data Security Using Monoalphabetic Cipher." International Journal of Artificial Intelligence & Robotics (IJAIR) 1, no. 1 (2019): 25. http://dx.doi.org/10.25139/ijair.v1i1.2029.
Full textKartha, Ranju S., and Varghese Paul. "Polyalphabetic Substitution Cipher Using Multiple Random Table." International Journal of Computer Sciences and Engineering 6, no. 5 (2018): 51–58. http://dx.doi.org/10.26438/ijcse/v6i5.5158.
Full textBasheer, Ghusoon. "Application of Polyalphabetic Substitution Cipher using Genetic Algorithm." AL-Rafidain Journal of Computer Sciences and Mathematics 5, no. 1 (2008): 57–68. http://dx.doi.org/10.33899/csmj.2008.163949.
Full textSom, Sukalyan, and Sabyasachi Ghosh. "A Simple Algebraic Model based Polyalphabetic Substitution Cipher." International Journal of Computer Applications 39, no. 8 (2012): 53–56. http://dx.doi.org/10.5120/4844-7111.
Full textIbraheem, Noor, and Mokhtar Hasan. "Combining Several Substitution Cipher Algorithms using Circular Queue Data Structure." Baghdad Science Journal 17, no. 4 (2020): 1320. http://dx.doi.org/10.21123/bsj.2020.17.4.1320.
Full textClark, Andrew, and Ed Dawson. "A PARALLEL GENETIC ALGORITHM FOR CRYPTANALYSIS OF THE POLYALPHABETIC SUBSTITUTION CIPHER." Cryptologia 21, no. 2 (1997): 129–38. http://dx.doi.org/10.1080/0161-119791885850.
Full textHoa, Nguyen Huu, Dang Quach Gia Binh, Do Yeong Kim, Young Namgoong та Si Choon Noh. "Vigenere 테이블을 이용한 3단계 다중 알파벳 치환 암호화 모델". Jouranl of Information and Security 22, № 3 (2022): 33–39. http://dx.doi.org/10.33778/kcsa.2022.22.3.033.
Full textImam Riadi, Abdul Fadlil, and Fahmi Auliya Tsani. "Pengamanan Citra Digital Berbasis Kriptografi Menggunakan Algoritma Vigenere Cipher." JISKA (Jurnal Informatika Sunan Kalijaga) 7, no. 1 (2022): 33–45. http://dx.doi.org/10.14421/jiska.2022.7.1.33-45.
Full textKravchenko, Oleksandr. "GENERAL TECHNOLOGY OF ENCRYPTION AND INTEGRATION OF DATA IN A PATTERN OF A PICTURE OF IMAGES THAT IS RESISTANT TO JPEG COMPRESSION." Bulletin of the National Technical University "KhPI". Series: Innovation researches in students’ scientific work, no. 2 (December 16, 2021): 22–28. http://dx.doi.org/10.20998/2220-4784.2021.02.04.
Full textFadlil, Abdul, Imam Riadi, and Achmad Nugrahantoro. "Kombinasi Sinkronisasi Jaringan Syaraf Tiruan dan Vigenere Cipher untuk Optimasi Keamanan Informasi." Digital Zone: Jurnal Teknologi Informasi dan Komunikasi 11, no. 1 (2020): 81–95. http://dx.doi.org/10.31849/digitalzone.v11i1.3945.
Full textKing, John C. "AN ALGORITHM FOR THE COMPLETE AUTOMATED CRYPTANALYSIS OF PERIODIC POLYALPHABETIC SUBSTITUTION CIPHERS." Cryptologia 18, no. 4 (1994): 332–55. http://dx.doi.org/10.1080/0161-119491882928.
Full textKaeding, Thomas. "Slippery hill-climbing technique for ciphertext-only cryptanalysis of periodic polyalphabetic substitution ciphers." Cryptologia 44, no. 3 (2019): 205–22. http://dx.doi.org/10.1080/01611194.2019.1655504.
Full textCassal-Quiroga, B. B., and E. Campos-Cantón. "Generation of Dynamical S-Boxes for Block Ciphers via Extended Logistic Map." Mathematical Problems in Engineering 2020 (March 19, 2020): 1–12. http://dx.doi.org/10.1155/2020/2702653.
Full textPermanasari, Yurika, and Erwin Harahap. "Kriptografi Polyalphabetic." Matematika 17, no. 1 (2018). http://dx.doi.org/10.29313/jmtm.v17i1.4065.
Full text"New Polyalphabetic Substitution Scheme for Secure Communication." International Journal of Innovative Technology and Exploring Engineering 9, no. 3 (2020): 3303–10. http://dx.doi.org/10.35940/ijitee.c9043.019320.
Full textMuhammad Aziz Fatchu Rachman, Rizqi Sukma Kharisma,. "PEMBUATAN APLIKASI NOTES MENGGUNAKAN ALGORITMA KRIPTOGRAFI POLYALPHABETIC SUBSTITUTION CIPHER KOMBINASI KODE ASCII DAN OPERASI XOR BERBASIS ANDROID." Respati 12, no. 2 (2017). http://dx.doi.org/10.35842/jtir.v12i2.176.
Full text