Journal articles on the topic 'Substitution ciphers'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Substitution ciphers.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Lysytska, Iryna, Kostiantyn Lysytskyi, Oleksii Nariezhnii, and Tetiana Hrinenko. "The influence of S-boxes on the arrival of the cipher to the state of random substitution." Radioelectronic and Computer Systems, no. 3 (September 29, 2023): 150–58. http://dx.doi.org/10.32620/reks.2023.3.12.
Full textPan, Yining. "The Scope of Application of Letter Frequency Analysis in Substitution Cipher." Journal of Physics: Conference Series 2386, no. 1 (December 1, 2022): 012015. http://dx.doi.org/10.1088/1742-6596/2386/1/012015.
Full textBandjur, Milos. "Novel method of discrete message ciphering with equal length of message and cryptogram." Facta universitatis - series: Electronics and Energetics 16, no. 2 (2003): 251–58. http://dx.doi.org/10.2298/fuee0302251b.
Full textHieu, Minh Nguyen, Duy Ho Ngoc, Canh Hoang Ngoc, Trung Dinh Phuong, and Manh Tran Cong. "New primitives of controlled elements F2/4 for block ciphers." International Journal of Electrical and Computer Engineering (IJECE) 10, no. 5 (October 1, 2020): 5470. http://dx.doi.org/10.11591/ijece.v10i5.pp5470-5478.
Full textRatseev, S. M., and V. M. Ratseev. "ON PERFECT IMITATION RESISTANT CIPHERS BASED ON COMBINATORIAL OBJECTS." Vestnik of Samara University. Natural Science Series 22, no. 1-2 (April 24, 2017): 46–50. http://dx.doi.org/10.18287/2541-7525-2016-22-1-2-46-50.
Full textRatseev, S. M. "ON PERFECT IMITATION RESISTANT CIPHERS OF SUBSTITUTION WITH UNBOUNDED KEY." Vestnik of Samara University. Natural Science Series 19, no. 9.1 (June 5, 2017): 42–48. http://dx.doi.org/10.18287/2541-7525-2013-19-9.1-42-48.
Full textTran Thi, Luong. "PROVING THE SECURITY OF AES BLOCK CIPHER BASED ON MODIFIED MIXCOLUMN." Journal of Computer Science and Cybernetics 40, no. 2 (June 10, 2024): 187–203. http://dx.doi.org/10.15625/1813-9663/18058.
Full textSayyed, Karishma Shaukat, Prof S. R. Ganolkar, and Prof S. O. Rajankar. "FPGA Implementation of Rectangle Lightweight Block Cipher." International Journal for Research in Applied Science and Engineering Technology 10, no. 5 (May 31, 2022): 2426–33. http://dx.doi.org/10.22214/ijraset.2022.42143.
Full textZahid, Amjad, Muhammad Arshad, and Musheer Ahmad. "A Novel Construction of Efficient Substitution-Boxes Using Cubic Fractional Transformation." Entropy 21, no. 3 (March 5, 2019): 245. http://dx.doi.org/10.3390/e21030245.
Full textEt al., Al-Bahrani. "A New Cipher Based on Feistel Structure and Chaotic Maps." Baghdad Science Journal 16, no. 1 (March 17, 2019): 0270. http://dx.doi.org/10.21123/bsj.16.1.(suppl.).0270.
Full textEt al., Al-Bahrani. "A New Cipher Based on Feistel Structure and Chaotic Maps." Baghdad Science Journal 16, no. 1(Suppl.) (March 17, 2019): 0270. http://dx.doi.org/10.21123/bsj.2019.16.1(suppl.).0270.
Full textForsyth, W. S., and R. Safavi-Naini. "AUTOMATED CRYPTANALYSIS OF SUBSTITUTION CIPHERS." Cryptologia 17, no. 4 (October 1993): 407–18. http://dx.doi.org/10.1080/0161-119391868033.
Full textRAJKUMAR, Dr G. "Linear Cryptanalysis of Substitution Ciphers Using Particle Swarm Optimization." Oriental journal of computer science and technology 10, no. 3 (September 25, 2017): 580–84. http://dx.doi.org/10.13005/ojcst/10.03.04.
Full textIbrahim, Nahla, and Johnson Agbinya. "Design of a Lightweight Cryptographic Scheme for Resource-Constrained Internet of Things Devices." Applied Sciences 13, no. 7 (March 30, 2023): 4398. http://dx.doi.org/10.3390/app13074398.
Full textDawood, Omar. "SUMER: A New Family of Lightweight and Traditional Block Ciphers with Multi-Modes." Iraqi Journal For Computer Science and Mathematics 5, no. 3 (July 8, 2024): 213–28. http://dx.doi.org/10.52866/ijcsm.2024.05.03.011.
Full textSt. John, Dennis. "Technology Tips: Exploring Hill Ciphers with Graphing Calculators." Mathematics Teacher 91, no. 3 (March 1998): 240–44. http://dx.doi.org/10.5951/mt.91.3.0240.
Full textSajjad, Muhammad, Tariq Shah, Huda Alsaud, and Maha Alammari. "Designing pair of nonlinear components of a block cipher over quaternion integers." AIMS Mathematics 8, no. 9 (2023): 21089–105. http://dx.doi.org/10.3934/math.20231074.
Full textHauer, Bradley, and Grzegorz Kondrak. "Decoding Anagrammed Texts Written in an Unknown Language and Script." Transactions of the Association for Computational Linguistics 4 (December 2016): 75–86. http://dx.doi.org/10.1162/tacl_a_00084.
Full textMujaddid, Azzam, and Sumarsono Sumarsono. "A Modifying of Hill Cipher Algorithm with 3 Substitution Caesar Cipher." Proceeding International Conference on Science and Engineering 1 (October 31, 2017): 157–63. http://dx.doi.org/10.14421/icse.v1.294.
Full textAgibalov, G. P. "SUBSTITUTION BLOCK CIPHERS WITH FUNCTIONAL KEYS." Prikladnaya diskretnaya matematika, no. 38 (December 1, 2017): 57–65. http://dx.doi.org/10.17223/20710410/38/4.
Full textCARROLL, JOHN M., and STEVE MARTIN. "THE AUTOMATED CRYPTANALYSIS OF SUBSTITUTION CIPHERS." Cryptologia 10, no. 4 (October 1986): 193–209. http://dx.doi.org/10.1080/0161-118691861001.
Full textAnderson, Roland. "CRYPTANALYTIG PROPERTIES OF SHORT SUBSTITUTION CIPHERS." Cryptologia 13, no. 1 (January 1989): 61–72. http://dx.doi.org/10.1080/0161-118991863772.
Full textDhavare, Amrapali, Richard M. Low, and Mark Stamp. "Efficient Cryptanalysis of Homophonic Substitution Ciphers." Cryptologia 37, no. 3 (July 3, 2013): 250–81. http://dx.doi.org/10.1080/01611194.2013.797041.
Full textNedjah, Nadia, and Luiza de Macedo Mourelle. "Designing substitution boxes for secure ciphers." International Journal of Innovative Computing and Applications 1, no. 1 (2007): 86. http://dx.doi.org/10.1504/ijica.2007.013404.
Full textSimkin, Mark G. "Using Spreadsheets to Teach Data Encryption Techniques." AIS Educator Journal 1, no. 1 (December 1, 2006): 27–37. http://dx.doi.org/10.3194/aise.2006.1.1.27.
Full textKhan, Majid, Abd Al Karim Haj Ismail, Iqra Ishaque, and Iqtadar Hussain. "New combination of simple additive and entropy weighting criteria for the selection of best substitution box." Journal of Intelligent & Fuzzy Systems 41, no. 1 (August 11, 2021): 2325–38. http://dx.doi.org/10.3233/jifs-211176.
Full textKhan, Muhammad Fahad, Khalid Saleem, Tariq Shah, Mohammad Mazyad Hazzazi, Ismail Bahkali, and Piyush Kumar Shukla. "Block Cipher’s Substitution Box Generation Based on Natural Randomness in Underwater Acoustics and Knight’s Tour Chain." Computational Intelligence and Neuroscience 2022 (May 20, 2022): 1–17. http://dx.doi.org/10.1155/2022/8338508.
Full textRavi, Sujith, and Kevin Knight. "Attacking Letter Substitution Ciphers with Integer Programming." Cryptologia 33, no. 4 (September 18, 2009): 321–34. http://dx.doi.org/10.1080/01611190903030920.
Full textLestari, Andriani Adi, and Nunik Yulianingsih. "Distribusi Difference dari S-Box Berbasis Fungsi Balikan Pada GF(28)." Jurnal Matematika 6, no. 2 (December 30, 2016): 93. http://dx.doi.org/10.24843/jmat.2016.v06.i02.p72.
Full textMohd Esa, N. F., S. F. Abdul-Latip, and N. A. Abu. "A New Design of Substitution Box with Ideal Strict Avalanche Criterion." Malaysian Journal of Mathematical Sciences 16, no. 4 (December 23, 2022): 697–715. http://dx.doi.org/10.47836/mjms.16.4.04.
Full textJang, Kyungbae, Gyeongju Song, Hyeokdong Kwon, Siwoo Uhm, Hyunji Kim, Wai-Kong Lee, and Hwajeong Seo. "Grover on PIPO." Electronics 10, no. 10 (May 17, 2021): 1194. http://dx.doi.org/10.3390/electronics10101194.
Full textAlhussain, Amanie Hasn. "Comparison between integer splitting cipher and traditional substitution ciphers, based on modular arithmetic." IOP Conference Series: Materials Science and Engineering 919 (September 26, 2020): 052004. http://dx.doi.org/10.1088/1757-899x/919/5/052004.
Full textSahar Yaseen, Basim. "Parallel Search Using Probabilistic DNA Sticker Model to Cryptanyze One Time Pad Polyalphabetic Cipher." Iraqi Journal for Electrical and Electronic Engineering 20, no. 1 (November 26, 2023): 104–10. http://dx.doi.org/10.37917/ijeee.20.1.11.
Full textAntal, Eugen, and Martin Eliáš. "Evolutionary Computation in Cryptanalysis of Classical Ciphers." Tatra Mountains Mathematical Publications 70, no. 1 (September 26, 2017): 179–97. http://dx.doi.org/10.1515/tmmp-2017-0026.
Full textPurwanti, Saputra Dwi Nurcahya, and Dian Nazelliana. "Message Security in Classical Cryptography Using the Vigenere Cipher Method." International Journal Software Engineering and Computer Science (IJSECS) 4, no. 1 (April 30, 2024): 350–57. http://dx.doi.org/10.35870/ijsecs.v4i1.2263.
Full textMohammad Shah, Isma Norshahila, Eddie Shahril Ismail, Faieza Samat, and Normahirah Nek Abd Rahman. "Modified Generalized Feistel Network Block Cipher for the Internet of Things." Symmetry 15, no. 4 (April 12, 2023): 900. http://dx.doi.org/10.3390/sym15040900.
Full textEjaz, Aisha, Ijaz Ali Shoukat, Umer Iqbal, Abdul Rauf, and Afshan Kanwal. "A secure key dependent dynamic substitution method for symmetric cryptosystems." PeerJ Computer Science 7 (July 19, 2021): e587. http://dx.doi.org/10.7717/peerj-cs.587.
Full textEchevarría, Alejandro Freyre, Ramses Rodríguez Aulet, and Alejandro García Gómez. "On some relations of SCA-related properties of S-box under the Hamming weight leakage mode." Journal of Science and Technology on Information security 3, no. 17 (April 1, 2023): 3–9. http://dx.doi.org/10.54654/isj.v2i17.902.
Full textBorissov, Yuri L., and Moon Ho Lee. "Bounds on Key Appearance Equivocation for Substitution Ciphers." IEEE Transactions on Information Theory 53, no. 6 (June 2007): 2294–96. http://dx.doi.org/10.1109/tit.2007.896865.
Full textRamesh, R. S., G. Athithan, and K. Thiruvengadam. "AN AUTOMATED APPROACH TO SOLVE SIMPLE SUBSTITUTION CIPHERS." Cryptologia 17, no. 2 (April 1993): 202–18. http://dx.doi.org/10.1080/0161-119391867872.
Full textJakobsen, Thomas. "A FAST METHOD FOR CRYPTANALYSIS OF SUBSTITUTION CIPHERS." Cryptologia 19, no. 3 (July 1995): 265–74. http://dx.doi.org/10.1080/0161-119591883944.
Full textOlson, Edwin. "Robust Dictionary Attack of Short Simple Substitution Ciphers." Cryptologia 31, no. 4 (October 8, 2007): 332–42. http://dx.doi.org/10.1080/01611190701272369.
Full textCollinson, Helen. "A fast method for cryptanalysis of substitution ciphers." Computers & Security 14, no. 5 (January 1995): 414. http://dx.doi.org/10.1016/0167-4048(95)97105-j.
Full textKuznetsov, О. О., М. О. Poluyanenko, S. O. Kandiy, and O. I. Peliukh. "Study of a new cost function for generating random substitutions of symmetric ciphers." Radiotekhnika, no. 209 (June 24, 2022): 71–82. http://dx.doi.org/10.30837/rt.2022.2.209.07.
Full textDerevianko, Ya A., Yu I. Gorbenko, and О. О. Kuznetsov. "Factorial number system for nonlinear substitutions generation." Radiotekhnika, no. 209 (June 24, 2022): 38–58. http://dx.doi.org/10.30837/rt.2022.2.209.04.
Full textKuznetsov, Alexandr, Lukasz Wieclaw, Nikolay Poluyanenko, Lukasz Hamera, Sergey Kandiy, and Yelyzaveta Lohachova. "Optimization of a Simulated Annealing Algorithm for S-Boxes Generating." Sensors 22, no. 16 (August 14, 2022): 6073. http://dx.doi.org/10.3390/s22166073.
Full textIshchukova, Evgenia, Ekaterina Maro, and Pavel Pristalov. "Algebraic Analysis of a Simplified Encryption Algorithm GOST R 34.12-2015." Computation 8, no. 2 (May 28, 2020): 51. http://dx.doi.org/10.3390/computation8020051.
Full textKuznetsov, О. О., Yu I. Горбенко, М. О. Poluyanenko, S. O. Kandiy, and E. D. Matveeva. "Properties of the cost function in the iterative algorithm for generating nonlinear substitution." Radiotekhnika, no. 209 (June 24, 2022): 16–28. http://dx.doi.org/10.30837/rt.2022.2.209.02.
Full textEum, Siwoo, Hyunjun Kim, Hyeokdong Kwon, Minjoo Sim, Gyeongju Song, and Hwajeong Seo. "Parallel Implementations of ARIA on ARM Processors and Graphics Processing Unit." Applied Sciences 12, no. 23 (November 30, 2022): 12246. http://dx.doi.org/10.3390/app122312246.
Full textAlkazaz, Noor R., Sean A. Irvine, and William J. Teahan. "An automatic cryptanalysis of simple substitution ciphers using compression." Information Security Journal: A Global Perspective 27, no. 1 (January 2, 2018): 57–75. http://dx.doi.org/10.1080/19393555.2018.1426799.
Full text