Academic literature on the topic 'Transposition cipher'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Transposition cipher.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Transposition cipher"
Garg, Satish Kumar. "Cryptography Using Transposition Cipher." Research Journal of Science and Technology 9, no. 1 (2017): 48. http://dx.doi.org/10.5958/2349-2988.2017.00008.0.
Full textLubis, Fahrul Ikhsan, Hasanal Fachri Satia Simbolon, Toras Pangidoan Batubara, and Rahmat Widia Sembiring. "Combination of Caesar Cipher Modification with Transposition Cipher." Advances in Science, Technology and Engineering Systems Journal 2, no. 5 (June 2017): 22–25. http://dx.doi.org/10.25046/aj020504.
Full textNasution, Adnan Buyung. "IMPLEMENTASI PENGAMANAN DATA DENGAN MENGGUNAKAN ALGORITMA CAESAR CIPHER DAN TRANSPOSISI CIPHER." JURNAL TEKNOLOGI INFORMASI 3, no. 1 (July 20, 2019): 1. http://dx.doi.org/10.36294/jurti.v3i1.680.
Full textAlkathiry, Omar, and Ahmad Al-Mogren. "A Powerful Genetic Algorithm to Crack a Transposition Cipher." International Journal of Future Computer and Communication 3, no. 6 (December 2014): 395–99. http://dx.doi.org/10.7763/ijfcc.2014.v3.335.
Full textWahyuni, Fika, Muhammad Khudzaifah, and Muhammad Nafie Jauhari. "Penyandian Super Enkripsi Menggunakan Columnar Transposition dan Modifikasi Hill Cipher dengan Invers Kiri Matriks Persegi Panjang." Jurnal Riset Mahasiswa Matematika 1, no. 2 (December 27, 2021): 105–17. http://dx.doi.org/10.18860/jrmm.v1i2.14224.
Full textRitter, Terry. "TRANSPOSITION CIPHER WITH PSEUDO-RANDOM SHUFFLING: THE DYNAMIC TRANSPOSITION COMBINER." Cryptologia 15, no. 1 (January 1991): 1–17. http://dx.doi.org/10.1080/0161-119191865731.
Full textLokman, Syiham Mohd, Chuah Chai Wen, Nurul Hidayah Binti Ab Rahman, and Isredza Rahmi Binti A. Hamid. "A Study of Caesar Cipher and Transposition Cipher in Jawi Messages." Advanced Science Letters 24, no. 3 (March 1, 2018): 1651–55. http://dx.doi.org/10.1166/asl.2018.11130.
Full textIneke Pekereng, Magdalena A., and Alz Danny Wowor. "Square transposition: an approach to the transposition process in block cipher." Bulletin of Electrical Engineering and Informatics 10, no. 6 (December 1, 2021): 3385–92. http://dx.doi.org/10.11591/eei.v10i6.3129.
Full textSyarif, Akhmad. "Modifikasi Caesar Cipher dengan Permutasi, Transposisi, Binary, Gerbang Logika, ASCII Dan HEXA." Jurnal Teknologi Informasi 4, no. 2 (December 10, 2020): 234–40. http://dx.doi.org/10.36294/jurti.v4i2.1350.
Full textSokouti, Massoud. "An approach in improving transposition cipher system." Indian Journal of Science and Technology 2, no. 8 (August 20, 2009): 9–15. http://dx.doi.org/10.17485/ijst/2009/v2i8.7.
Full textDissertations / Theses on the topic "Transposition cipher"
Clark, Andrew J. "Optimisation heuristics for cryptology." Thesis, Queensland University of Technology, 1998. https://eprints.qut.edu.au/15777/1/Andrew_Clark_Thesis.pdf.
Full textClark, Andrew J. "Optimisation Heuristics for Cryptology." Queensland University of Technology, 1998. http://eprints.qut.edu.au/15777/.
Full textFojtová, Lucie. "Softwarová podpora výuky klasické kryptoanalýzy." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2010. http://www.nusl.cz/ntk/nusl-218739.
Full textBayer, Tomáš. "Návrh hardwarového šifrovacího modulu." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2009. http://www.nusl.cz/ntk/nusl-218076.
Full textVozák, Petr. "Knihovna algoritmů pro šifrování textu." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2011. http://www.nusl.cz/ntk/nusl-237044.
Full textMILICHOVSKÁ, Eva. "Historie šifrovacích metod a jejich aplikace." Master's thesis, 2018. http://www.nusl.cz/ntk/nusl-385158.
Full textBooks on the topic "Transposition cipher"
Courville, Joseph B. Manual for cryptanalysis of the columnar double transposition cipher: A study of cryptanalysis. South Gate, Calif., U.S.A. (10240 Virginia Ave, South Gate 90280): J.B. Courville, 1986.
Find full textGeneral Solution for the Double Transposition Cipher (Cryptographic Series C-84). Aegean Park Pr, 1990.
Find full textBarker, Wayne G. Cryptanalysis of the Double Transposition Cipher: Includes Problems and Computer Programs (Cryptographic Series , No 69). Aegean Park Press, 1996.
Find full textBarker, Wayne G. Cryptanalysis of the Single Columnar Transposition Cipher With Added Computer Program Written in Basic: Includes Computer Program Written in Basic (Cryptographic Series , No 59). Aegean Park Pr, 1992.
Find full textBarker, Wayne G. Cryptanalysis of the Single Columnar Transposition Cipher With Added Computer Program Written in Basic: Includes Computer Program Written in Basic (Cryptographic Series , No 59). Aegean Park Pr, 1992.
Find full textF, Friedman William. Military Cryptanalysis: Transposition and Fractionating Systems (Cryptographic Series , No 61, Part 4). Aegean Park Pr, 1993.
Find full textF, Friedman William. Military Cryptanalysis, Part IV: Transposition and Fractionating Systems (Cryptographic Series, No 61). Aegean Park Pr, 1993.
Find full textBook chapters on the topic "Transposition cipher"
Weik, Martin H. "transposition cipher." In Computer Science and Communications Dictionary, 1832. Boston, MA: Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_20080.
Full textBoryczka, Urszula, and Kamil Dworak. "Cryptanalysis of Transposition Cipher Using Evolutionary Algorithms." In Computational Collective Intelligence. Technologies and Applications, 623–32. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-11289-3_63.
Full textShukla, Apratim, Mayank K. Tolani, Dipan Polley, Abhishek Thazhethe Kalathil, and N. Subhashini. "Enyo: A Multistage Partition and Transposition Based Cipher." In Communication and Intelligent Systems, 395–407. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-1089-9_32.
Full textSong, Jun, Fan Yang, Maocai Wang, and Huanguo Zhang. "Cryptanalysis of Transposition Cipher Using Simulated Annealing Genetic Algorithm." In Advances in Computation and Intelligence, 795–802. Berlin, Heidelberg: Springer Berlin Heidelberg, 2008. http://dx.doi.org/10.1007/978-3-540-92137-0_87.
Full textRitu, Niram, Ekta Narwal, and Sumeet Gill. "A Novel Cipher Technique Using Substitution and Transposition Methods." In Rising Threats in Expert Applications and Solutions, 123–29. Singapore: Springer Nature Singapore, 2022. http://dx.doi.org/10.1007/978-981-19-1122-4_14.
Full textMishra, Girish, and Sarvjeet Kaur. "Cryptanalysis of Transposition Cipher Using Hill Climbing and Simulated Annealing." In Advances in Intelligent Systems and Computing, 293–302. New Delhi: Springer India, 2014. http://dx.doi.org/10.1007/978-81-322-2220-0_23.
Full textBhowmik, Sandeep, and Sriyankar Acharyya. "Application of GA in Key Generation for Image Transposition Cipher Algorithm." In Communications in Computer and Information Science, 342–48. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-22786-8_43.
Full textJain, Ashish, Prakash C. Sharma, Santosh K. Vishwakarma, Nirmal K. Gupta, and Vaibhav C. Gandhi. "Metaheuristic Techniques for Automated Cryptanalysis of Classical Transposition Cipher: A Review." In Smart Systems: Innovations in Computing, 467–78. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-2877-1_43.
Full textJain, Ashish, Nirmal K. Gupta, Santosh K. Vishwakarma, and Prakash C. Sharma. "Swarm Intelligence Techniques for Automated Cryptanalysis of Classical Transposition Cipher: A Review." In Smart Systems: Innovations in Computing, 321–31. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-2877-1_29.
Full textSalomon, David. "Transposition Ciphers." In Data Privacy and Security, 39–57. New York, NY: Springer New York, 2003. http://dx.doi.org/10.1007/978-0-387-21707-9_3.
Full textConference papers on the topic "Transposition cipher"
Djamalilleil, As'ad, Muslim Muslim, Yulita Salim, Erick Irawadi Alwi, Huzain Azis, and Herman. "Modified Transposition Cipher Algorithm for Images Encryption." In 2018 2nd East Indonesia Conference on Computer and Information Technology (EIConCIT). IEEE, 2018. http://dx.doi.org/10.1109/eiconcit.2018.8878326.
Full textPal, Jayanta Kumar, J. K. Mandal, and Somsubhra Gupta. "Composite Transposition Substitution Chaining Based Cipher Technique." In 2008 16th International Conference on Advanced Computing and Communications. IEEE, 2008. http://dx.doi.org/10.1109/adcom.2008.4760485.
Full textFernando, Maricel Grace Z., Ariel M. Sison, and Ruji P. Medina. "Securing Private Key using New Transposition Cipher Technique." In 2019 IEEE Eurasia Conference on IOT, Communication and Engineering (ECICE). IEEE, 2019. http://dx.doi.org/10.1109/ecice47484.2019.8942798.
Full textWulandari, Gia S., Wahyu Rismawan, and Siti Saadah. "Differential evolution for the cryptanalysis of transposition cipher." In 2015 3rd International Conference on Information and Communication Technology (ICoICT ). IEEE, 2015. http://dx.doi.org/10.1109/icoict.2015.7231394.
Full textTiozon, Mark Julius P., Jessie R. Paragas, and Neil M. Pascual. "Implementation of Traditional Transposition Cipher with Salting Principle." In 2021 3rd International Conference on Research and Academic Community Services (ICRACOS). IEEE, 2021. http://dx.doi.org/10.1109/icracos53680.2021.9702062.
Full textKrishna, B. Hari, I. Raja Sekhar Reddy, S. Kiran, and R. Pradeep Kumar Reddy. "Multiple text encryption, key entrenched, distributed cipher using pairing functions and transposition ciphers." In 2016 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET). IEEE, 2016. http://dx.doi.org/10.1109/wispnet.2016.7566299.
Full textPutrie, Vike Maylana, Christy Atika Sari, De Rosal Ignatius Moses Setiadi, and Eko Hari Rachmawanto. "Super Encryption using Transposition-Hill Cipher for Digital Color Image." In 2018 International Seminar on Research of Information Technology and Intelligent Systems (ISRITI). IEEE, 2018. http://dx.doi.org/10.1109/isriti.2018.8864361.
Full textJain, Mamta, and Saroj Kumar Lenka. "Secret data transmission using vital image steganography over transposition cipher." In 2015 International Conference on Green Computing and Internet of Things (ICGCIoT). IEEE, 2015. http://dx.doi.org/10.1109/icgciot.2015.7380614.
Full textBenlcouiri, Younes, Moulay Chrif Ismaili, and Abdelmalek Azizi. "Substitution & transposition on images by using advanced affine cipher." In 2014 International Conference on Multimedia Computing and Systems (ICMCS). IEEE, 2014. http://dx.doi.org/10.1109/icmcs.2014.6911335.
Full textSiregar, Saidi, F. Fadlina, and Surya Nasution. "Enhancing Data Security of Columnar Transposition Cipher by Fibonacci Codes Algorithm." In Proceedings of the Third Workshop on Multidisciplinary and Its Applications, WMA-3 2019, 11-14 December 2019, Medan, Indonesia. EAI, 2020. http://dx.doi.org/10.4108/eai.11-12-2019.2290839.
Full text