Academic literature on the topic 'Transposition cipher'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Transposition cipher.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Transposition cipher"
G. M. Karpura Dheepan. "Advanced Nonlinear Analysis Technique in Modern Transposition Ciphers." Communications on Applied Nonlinear Analysis 31, no. 6s (2024): 653–69. http://dx.doi.org/10.52783/cana.v31.1250.
Full textOstia, Mary Grace, Alessa Crisostomo, David Jhozel Lucas, et al. "An Enhancement of Text Encryption Algorithm with Hybrid Two-Square Cipher and Columnar Transposition Cipher." International Journal of Computing Sciences Research 8 (January 1, 2024): 3202–16. https://doi.org/10.25147/ijcsr.2017.001.1.214.
Full textYu, Zizhen. "Historical research on classification of Classical Cryptography." Theoretical and Natural Science 11, no. 1 (2023): 165–71. http://dx.doi.org/10.54254/2753-8818/11/20230403.
Full textGarg, Satish Kumar. "Cryptography Using Transposition Cipher." Research Journal of Science and Technology 9, no. 1 (2017): 48. http://dx.doi.org/10.5958/2349-2988.2017.00008.0.
Full textLubis, Fahrul Ikhsan, Hasanal Fachri Satia Simbolon, Toras Pangidoan Batubara, and Rahmat Widia Sembiring. "Combination of Caesar Cipher Modification with Transposition Cipher." Advances in Science, Technology and Engineering Systems Journal 2, no. 5 (2017): 22–25. http://dx.doi.org/10.25046/aj020504.
Full textHassan, A., A. Garko, S. Sani, U. Abdullahi, and S. Sahalu. "Combined Techniques of Hill Cipher and Transposition Cipher." Trends Journal of Sciences Research 1, no. 1 (2023): 57–64. http://dx.doi.org/10.31586/jml.2023.822.
Full textNasution, Adnan Buyung. "IMPLEMENTASI PENGAMANAN DATA DENGAN MENGGUNAKAN ALGORITMA CAESAR CIPHER DAN TRANSPOSISI CIPHER." JURNAL TEKNOLOGI INFORMASI 3, no. 1 (2019): 1. http://dx.doi.org/10.36294/jurti.v3i1.680.
Full textAgustina, Laura, Imam Sujarwo, and Muhammad Khudzaifah. "Membangun Super Enkripsi untuk Mengamankan Pesan." Jurnal Riset Mahasiswa Matematika 2, no. 5 (2023): 195–200. http://dx.doi.org/10.18860/jrmm.v2i5.21036.
Full textAgustina, Laura, Imam Sujarwo, and Muhammad Khudzaifah. "Membangun Super Enkripsi untuk Mengamankan Pesan." Jurnal Riset Mahasiswa Matematika 2, no. 4 (2023): 132–37. http://dx.doi.org/10.18860/jrmm.v2i4.14470.
Full textWahyuni, Fika, Muhammad Khudzaifah, and Muhammad Nafie Jauhari. "Penyandian Super Enkripsi Menggunakan Columnar Transposition dan Modifikasi Hill Cipher dengan Invers Kiri Matriks Persegi Panjang." Jurnal Riset Mahasiswa Matematika 1, no. 2 (2021): 105–17. http://dx.doi.org/10.18860/jrmm.v1i2.14224.
Full textDissertations / Theses on the topic "Transposition cipher"
Clark, Andrew J. "Optimisation heuristics for cryptology." Thesis, Queensland University of Technology, 1998. https://eprints.qut.edu.au/15777/1/Andrew_Clark_Thesis.pdf.
Full textClark, Andrew J. "Optimisation Heuristics for Cryptology." Queensland University of Technology, 1998. http://eprints.qut.edu.au/15777/.
Full textFojtová, Lucie. "Softwarová podpora výuky klasické kryptoanalýzy." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2010. http://www.nusl.cz/ntk/nusl-218739.
Full textBayer, Tomáš. "Návrh hardwarového šifrovacího modulu." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2009. http://www.nusl.cz/ntk/nusl-218076.
Full textVozák, Petr. "Knihovna algoritmů pro šifrování textu." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2011. http://www.nusl.cz/ntk/nusl-237044.
Full textMILICHOVSKÁ, Eva. "Historie šifrovacích metod a jejich aplikace." Master's thesis, 2018. http://www.nusl.cz/ntk/nusl-385158.
Full textBooks on the topic "Transposition cipher"
Courville, Joseph B. Manual for cryptanalysis of the columnar double transposition cipher: A study of cryptanalysis. J.B. Courville, 1986.
Find full textGeneral Solution for the Double Transposition Cipher (Cryptographic Series C-84). Aegean Park Pr, 1990.
Find full textBarker, Wayne G. Cryptanalysis of the Double Transposition Cipher: Includes Problems and Computer Programs (Cryptographic Series , No 69). Aegean Park Press, 1996.
Find full textBarker, Wayne G. Cryptanalysis of the Single Columnar Transposition Cipher With Added Computer Program Written in Basic: Includes Computer Program Written in Basic (Cryptographic Series , No 59). Aegean Park Pr, 1992.
Find full textBarker, Wayne G. Cryptanalysis of the Single Columnar Transposition Cipher With Added Computer Program Written in Basic: Includes Computer Program Written in Basic (Cryptographic Series , No 59). Aegean Park Pr, 1992.
Find full textF, Friedman William. Military Cryptanalysis: Transposition and Fractionating Systems (Cryptographic Series , No 61, Part 4). Aegean Park Pr, 1993.
Find full textDiepenbroek, Martine. The Spartan Scytale and Developments in Ancient and Modern Cryptography. Bloomsbury Publishing Plc, 2023. http://dx.doi.org/10.5040/9781350281301.
Full textF, Friedman William. Military Cryptanalysis, Part IV: Transposition and Fractionating Systems (Cryptographic Series, No 61). Aegean Park Pr, 1993.
Find full textBook chapters on the topic "Transposition cipher"
Weik, Martin H. "transposition cipher." In Computer Science and Communications Dictionary. Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_20080.
Full textBoryczka, Urszula, and Kamil Dworak. "Cryptanalysis of Transposition Cipher Using Evolutionary Algorithms." In Computational Collective Intelligence. Technologies and Applications. Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-11289-3_63.
Full textShukla, Apratim, Mayank K. Tolani, Dipan Polley, Abhishek Thazhethe Kalathil, and N. Subhashini. "Enyo: A Multistage Partition and Transposition Based Cipher." In Communication and Intelligent Systems. Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-1089-9_32.
Full textSong, Jun, Fan Yang, Maocai Wang, and Huanguo Zhang. "Cryptanalysis of Transposition Cipher Using Simulated Annealing Genetic Algorithm." In Advances in Computation and Intelligence. Springer Berlin Heidelberg, 2008. http://dx.doi.org/10.1007/978-3-540-92137-0_87.
Full textRitu, Niram, Ekta Narwal, and Sumeet Gill. "A Novel Cipher Technique Using Substitution and Transposition Methods." In Rising Threats in Expert Applications and Solutions. Springer Nature Singapore, 2022. http://dx.doi.org/10.1007/978-981-19-1122-4_14.
Full textMishra, Girish, and Sarvjeet Kaur. "Cryptanalysis of Transposition Cipher Using Hill Climbing and Simulated Annealing." In Advances in Intelligent Systems and Computing. Springer India, 2014. http://dx.doi.org/10.1007/978-81-322-2220-0_23.
Full textBhowmik, Sandeep, and Sriyankar Acharyya. "Application of GA in Key Generation for Image Transposition Cipher Algorithm." In Communications in Computer and Information Science. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-22786-8_43.
Full textJain, Ashish, Prakash C. Sharma, Santosh K. Vishwakarma, Nirmal K. Gupta, and Vaibhav C. Gandhi. "Metaheuristic Techniques for Automated Cryptanalysis of Classical Transposition Cipher: A Review." In Smart Systems: Innovations in Computing. Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-2877-1_43.
Full textJain, Ashish, Nirmal K. Gupta, Santosh K. Vishwakarma, and Prakash C. Sharma. "Swarm Intelligence Techniques for Automated Cryptanalysis of Classical Transposition Cipher: A Review." In Smart Systems: Innovations in Computing. Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-2877-1_29.
Full textSalomon, David. "Transposition Ciphers." In Data Privacy and Security. Springer New York, 2003. http://dx.doi.org/10.1007/978-0-387-21707-9_3.
Full textConference papers on the topic "Transposition cipher"
Fauziah, Sunny Arief Sudiro, Bayu Kumoro Yakti, Ragiel Hadi Prayitno, and Sarifuddin Madenda. "Parallelizing Cipher Processes with Finite State Machine in MATLAB for Substitution and Transposition." In 2024 IEEE Asia-Pacific Conference on Geoscience, Electronics and Remote Sensing Technology (AGERS). IEEE, 2024. https://doi.org/10.1109/agers65212.2024.10932960.
Full textDjamalilleil, As'ad, Muslim Muslim, Yulita Salim, Erick Irawadi Alwi, Huzain Azis, and Herman. "Modified Transposition Cipher Algorithm for Images Encryption." In 2018 2nd East Indonesia Conference on Computer and Information Technology (EIConCIT). IEEE, 2018. http://dx.doi.org/10.1109/eiconcit.2018.8878326.
Full textPal, Jayanta Kumar, J. K. Mandal, and Somsubhra Gupta. "Composite Transposition Substitution Chaining Based Cipher Technique." In 2008 16th International Conference on Advanced Computing and Communications. IEEE, 2008. http://dx.doi.org/10.1109/adcom.2008.4760485.
Full textBorodzhieva, Adriana. "MATLAB-BASED SOFTWARE TOOL FOR IMPLEMENTATION OF TRIFID CIPHERS USING 64-SYMBOL ALPHABET." In eLSE 2017. Carol I National Defence University Publishing House, 2017. http://dx.doi.org/10.12753/2066-026x-17-050.
Full textFernando, Maricel Grace Z., Ariel M. Sison, and Ruji P. Medina. "Securing Private Key using New Transposition Cipher Technique." In 2019 IEEE Eurasia Conference on IOT, Communication and Engineering (ECICE). IEEE, 2019. http://dx.doi.org/10.1109/ecice47484.2019.8942798.
Full textWulandari, Gia S., Wahyu Rismawan, and Siti Saadah. "Differential evolution for the cryptanalysis of transposition cipher." In 2015 3rd International Conference on Information and Communication Technology (ICoICT ). IEEE, 2015. http://dx.doi.org/10.1109/icoict.2015.7231394.
Full textTiozon, Mark Julius P., Jessie R. Paragas, and Neil M. Pascual. "Implementation of Traditional Transposition Cipher with Salting Principle." In 2021 3rd International Conference on Research and Academic Community Services (ICRACOS). IEEE, 2021. http://dx.doi.org/10.1109/icracos53680.2021.9702062.
Full textKrishna, B. Hari, I. Raja Sekhar Reddy, S. Kiran, and R. Pradeep Kumar Reddy. "Multiple text encryption, key entrenched, distributed cipher using pairing functions and transposition ciphers." In 2016 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET). IEEE, 2016. http://dx.doi.org/10.1109/wispnet.2016.7566299.
Full textHamood, Dalal N. "Key Transposition Cipher and Decipher based on Genetic Algorithm." In 2022 International Conference on Artificial Intelligence of Things (ICAIoT). IEEE, 2022. http://dx.doi.org/10.1109/icaiot57170.2022.10121893.
Full textPutrie, Vike Maylana, Christy Atika Sari, De Rosal Ignatius Moses Setiadi, and Eko Hari Rachmawanto. "Super Encryption using Transposition-Hill Cipher for Digital Color Image." In 2018 International Seminar on Research of Information Technology and Intelligent Systems (ISRITI). IEEE, 2018. http://dx.doi.org/10.1109/isriti.2018.8864361.
Full text