Journal articles on the topic 'Transposition cipher'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Transposition cipher.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
G. M. Karpura Dheepan. "Advanced Nonlinear Analysis Technique in Modern Transposition Ciphers." Communications on Applied Nonlinear Analysis 31, no. 6s (2024): 653–69. http://dx.doi.org/10.52783/cana.v31.1250.
Full textOstia, Mary Grace, Alessa Crisostomo, David Jhozel Lucas, et al. "An Enhancement of Text Encryption Algorithm with Hybrid Two-Square Cipher and Columnar Transposition Cipher." International Journal of Computing Sciences Research 8 (January 1, 2024): 3202–16. https://doi.org/10.25147/ijcsr.2017.001.1.214.
Full textYu, Zizhen. "Historical research on classification of Classical Cryptography." Theoretical and Natural Science 11, no. 1 (2023): 165–71. http://dx.doi.org/10.54254/2753-8818/11/20230403.
Full textGarg, Satish Kumar. "Cryptography Using Transposition Cipher." Research Journal of Science and Technology 9, no. 1 (2017): 48. http://dx.doi.org/10.5958/2349-2988.2017.00008.0.
Full textLubis, Fahrul Ikhsan, Hasanal Fachri Satia Simbolon, Toras Pangidoan Batubara, and Rahmat Widia Sembiring. "Combination of Caesar Cipher Modification with Transposition Cipher." Advances in Science, Technology and Engineering Systems Journal 2, no. 5 (2017): 22–25. http://dx.doi.org/10.25046/aj020504.
Full textHassan, A., A. Garko, S. Sani, U. Abdullahi, and S. Sahalu. "Combined Techniques of Hill Cipher and Transposition Cipher." Trends Journal of Sciences Research 1, no. 1 (2023): 57–64. http://dx.doi.org/10.31586/jml.2023.822.
Full textNasution, Adnan Buyung. "IMPLEMENTASI PENGAMANAN DATA DENGAN MENGGUNAKAN ALGORITMA CAESAR CIPHER DAN TRANSPOSISI CIPHER." JURNAL TEKNOLOGI INFORMASI 3, no. 1 (2019): 1. http://dx.doi.org/10.36294/jurti.v3i1.680.
Full textAgustina, Laura, Imam Sujarwo, and Muhammad Khudzaifah. "Membangun Super Enkripsi untuk Mengamankan Pesan." Jurnal Riset Mahasiswa Matematika 2, no. 5 (2023): 195–200. http://dx.doi.org/10.18860/jrmm.v2i5.21036.
Full textAgustina, Laura, Imam Sujarwo, and Muhammad Khudzaifah. "Membangun Super Enkripsi untuk Mengamankan Pesan." Jurnal Riset Mahasiswa Matematika 2, no. 4 (2023): 132–37. http://dx.doi.org/10.18860/jrmm.v2i4.14470.
Full textWahyuni, Fika, Muhammad Khudzaifah, and Muhammad Nafie Jauhari. "Penyandian Super Enkripsi Menggunakan Columnar Transposition dan Modifikasi Hill Cipher dengan Invers Kiri Matriks Persegi Panjang." Jurnal Riset Mahasiswa Matematika 1, no. 2 (2021): 105–17. http://dx.doi.org/10.18860/jrmm.v1i2.14224.
Full textMR.SAGAR, RAJMANE, and VALSANG PROF.AARTI. "MODIFYING THE SECURITY OF CLASSICAL CAESAR CIPHER TECHNIQUE USING SOME RANDOMIZED APPROACH." IJIERT - International Journal of Innovations in Engineering Research and Technology NITET-18 (March 17, 2018): 11. https://doi.org/10.5281/zenodo.1451310.
Full textS, G. Srikantaswamy Dr. H. D. Phaneendra. "Improved Caesar Cipher with Random Number Generation Technique and Multistage Encryption." International Journal on Cryptography and Information Security (IJCIS) 2, no. 4 (2012): 11. https://doi.org/10.5281/zenodo.6622413.
Full textS, G. Srikantaswamy1 and Dr. H. D. Phaneendra2. "Improved Caesar Cipher with Random Number Generation Technique and Multistage Encryption." International Journal on Cryptography and Information Security (IJCIS) 2, no. 4 (2012): 39–49. https://doi.org/10.5281/zenodo.6921108.
Full textAgustina, Laura, Imam Sujarwo, and Muhammad Khudzaifah. "Membangun Super Enkripsi untuk Mengamankan Pesan." Jurnal Riset Mahasiswa Matematika 2, no. 3 (2023): 84–89. http://dx.doi.org/10.18860/jrmm.v2i3.16335.
Full textDagadu, Joshua, Albert Armah, Emelia O. Aboagye, and Sandra A. Mansuru. "Rubik’s Cube Enhanced Columnar Transposition Cipher." Journal of Computer Sciences and Applications 12, no. 2 (2024): 31–37. https://doi.org/10.12691/jcsa-12-2-1.
Full textAlkathiry, Omar, and Ahmad Al-Mogren. "A Powerful Genetic Algorithm to Crack a Transposition Cipher." International Journal of Future Computer and Communication 3, no. 6 (2014): 395–99. http://dx.doi.org/10.7763/ijfcc.2014.v3.335.
Full textS. Vani Shree. "Encryption and Decryption of Data Using Edge Bimagic Mean Labeling and Hill Cipher Technique." Advances in Nonlinear Variational Inequalities 28, no. 6s (2025): 53–63. https://doi.org/10.52783/anvi.v28.4118.
Full textRitter, Terry. "TRANSPOSITION CIPHER WITH PSEUDO-RANDOM SHUFFLING: THE DYNAMIC TRANSPOSITION COMBINER." Cryptologia 15, no. 1 (1991): 1–17. http://dx.doi.org/10.1080/0161-119191865731.
Full textSyarif, Akhmad. "Modifikasi Caesar Cipher dengan Permutasi, Transposisi, Binary, Gerbang Logika, ASCII Dan HEXA." Jurnal Teknologi Informasi 4, no. 2 (2020): 234–40. http://dx.doi.org/10.36294/jurti.v4i2.1350.
Full textIneke Pekereng, Magdalena A., and Alz Danny Wowor. "Square transposition: an approach to the transposition process in block cipher." Bulletin of Electrical Engineering and Informatics 10, no. 6 (2021): 3385–92. http://dx.doi.org/10.11591/eei.v10i6.3129.
Full textSiregar, Iskandar Muda. "PENERAPAN ALGORITMA AFFINE CIPHER DAN ALGORITMA COLOUMNAR TRANSPOSITION DALAM KEAMANAN TEKS." Jurnal Informatika Kaputama (JIK) 3, no. 1 (2019): 6–12. http://dx.doi.org/10.59697/jik.v3i1.391.
Full textLokman, Syiham Mohd, Chuah Chai Wen, Nurul Hidayah Binti Ab Rahman, and Isredza Rahmi Binti A. Hamid. "A Study of Caesar Cipher and Transposition Cipher in Jawi Messages." Advanced Science Letters 24, no. 3 (2018): 1651–55. http://dx.doi.org/10.1166/asl.2018.11130.
Full textMuhammad Fadlan, Haryansyah, and Rosmini. "Pengamanan Data melalui Model Super Enkripsi Autokey Cipher dan Transposisi Kolom." Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) 5, no. 6 (2021): 1113–19. http://dx.doi.org/10.29207/resti.v5i6.3566.
Full textTafakur, Zidand BP, Sakina Sudin, and Adelina Ibrahim. "Aplikasi Enkripsi dan Dekripsi Menggunakan Metode Triple Transppsition Viginere Cipher." Jurnal Teknik Informatika (J-Tifa) 5, no. 2 (2022): 21–27. http://dx.doi.org/10.52046/j-tifa.v5i2.1447.
Full textSokouti, Massoud. "An approach in improving transposition cipher system." Indian Journal of Science and Technology 2, no. 8 (2009): 9–15. http://dx.doi.org/10.17485/ijst/2009/v2i8.7.
Full textH. ASNAEEL, YASEEN, and NAJLA B. IBRAHEAM. "ENHANCING TRANSPOSITION CIPHER METHODS USING DNA ENCRYPTION." Journal of University of Anbar for Pure Science 7, no. 1 (2013): 233–39. http://dx.doi.org/10.37652/juaps.2013.83081.
Full textJASSIM, M. KH. "Improved PSO Algorithm to Attack Transposition Cipher." Engineering and Technology Journal 35, no. 2B (2017): 144–49. http://dx.doi.org/10.30684/etj.2017.138650.
Full textNugraha, Yuniardi Wahyu, Thresye Thresye, and Oni Soesanto. "MODIFIKASI HILL CIPHER DENGAN MENGGUNAKAN MATRIKS KUNCI ORTHOGONAL DAN TRANSPOSITION SUBSTITUTION LEFT RIGHT SHIFT (TSLRS)." EPSILON: JURNAL MATEMATIKA MURNI DAN TERAPAN 17, no. 1 (2023): 133. http://dx.doi.org/10.20527/epsilon.v17i1.9232.
Full textGrace Z, Maricel. "Secured Private Key Handling using Transposition Cipher Technique." International Journal of Advanced Trends in Computer Science and Engineering 9, no. 1.1 S I (2020): 85–89. http://dx.doi.org/10.30534/ijatcse/2020/1691.12020.
Full textLasry, George, Nils Kopal, and Arno Wacker. "Cryptanalysis of columnar transposition cipher with long keys." Cryptologia 40, no. 4 (2016): 374–98. http://dx.doi.org/10.1080/01611194.2015.1087074.
Full textanand, V. B. Kirub, and R. Siva kumar. "Queuing Network using Job Scheduling using Transposition Cipher." International Journal of P2P Network Trends and Technology 8, no. 4 (2018): 6–10. http://dx.doi.org/10.14445/22492615/ijptt-v8i4p402.
Full textDina, Bela, Dadang Iskandar Mulyana, and Julinar Sari Hutagalung. "Algoritma ADFGVX Product Transposition Cipher Pada Pengenkripsian Pesan Text." Jurnal Pendidikan Sains dan Komputer 2, no. 01 (2022): 172–83. http://dx.doi.org/10.47709/jpsk.v2i01.1378.
Full textLubis, Ali Akbar, Ng Poi Wong, Irfan Arfiandi, V. Immanuel Damanik, and Adithya Maulana. "Steganografi pada Citra dengan Metode MLSB dan Enkripsi Triple Transposition Vigenere Cipher." Jurnal SIFO Mikroskil 16, no. 2 (2015): 125–34. http://dx.doi.org/10.55601/jsm.v16i2.244.
Full textSinha, Nishith, and Kishore Bhamidipati. "Improving Security of Vigenère Cipher by Double Columnar Transposition." International Journal of Computer Applications 100, no. 14 (2014): 6–10. http://dx.doi.org/10.5120/17591-8290.
Full textHameed, Sarab M., and Dalal N. Hmood. "PARTICLES SWARM OPTIMIZATION FOR THE CRYPTANALYSIS OF TRANSPOSITION CIPHER." Journal of Al-Nahrain University Science 13, no. 4 (2010): 211–15. http://dx.doi.org/10.22401/jnus.13.4.30.
Full textMahalakshmi, B., and Ch Sravan. "An Overview on Disrupted Transposition Cipher for Security Enhancement." International Journal of Computer Applications 143, no. 13 (2016): 9–12. http://dx.doi.org/10.5120/ijca2016910308.
Full textBarrieta, Raymond G., Aleksis S. Canlas, Dan Michael A. Cortez, and Khatalyn E. Mata. "Modified Hill Cipher Algorithm using Myszkowski Transposition to address Known-Plaintext attack." International Journal for Research in Applied Science and Engineering Technology 10, no. 4 (2022): 3242–49. http://dx.doi.org/10.22214/ijraset.2022.41970.
Full textSimanullang, Sanco. "PENGAMANAN DATA DALAM JARINGAN LAN DENGAN MENGGUNAKAN ALGORITMA CHIPER TRANSPOSISI." METHODIKA: Jurnal Teknik Informatika dan Sistem Informasi 5, no. 2 (2019): 12–17. http://dx.doi.org/10.46880/mtk.v5i2.421.
Full textRachmawati, Dian, Sri Melvani Hardi, and Raju Partogi Pasaribu. "Combination of columnar transposition cipher caesar cipher and lempel ziv welch algorithm in image security and compression." Journal of Physics: Conference Series 1339 (December 2019): 012007. http://dx.doi.org/10.1088/1742-6596/1339/1/012007.
Full textAhmed, N., Y. Saleem, H. A. Habib, S. M. Afzal, and S. K. Khurshid. "A Novel Image Encryption Scheme Based on Orthogonal Vectors." Nucleus 52, no. 2 (2015): 71–78. https://doi.org/10.71330/thenucleus.2015.652.
Full textMadushani, A. P., and P. G. R. S. Ranasinghe. "A symmetric and a transposition cipher using the Euler’s totient function." Ceylon Journal of Science 48, no. 4 (2019): 327. http://dx.doi.org/10.4038/cjs.v48i4.7672.
Full textTwum, Frimpong, J. B., and Morgan-Darko William. "A Proposed Enhanced Transposition Cipher Algorithm based on Rubik’s Cube Transformations." International Journal of Computer Applications 182, no. 35 (2019): 18–26. http://dx.doi.org/10.5120/ijca2019918323.
Full textAli-Pacha, Hana, Naima Hadj- Said, Adda Ali Pacha, Mohamad Afendee Mohamed, and Mustafa Mamat. "The six-dos transposition cipher based on the rubik s cube." International Journal of Advanced Technology and Engineering Exploration 8, no. 75 (2021): 258–73. http://dx.doi.org/10.19101/ijatee.2020.762150.
Full textShibeeb, Ahmed Kareem, and Mohammed Hussein Ahmed. "Use of a new approach to automated break transposition cipher system." IOP Conference Series: Materials Science and Engineering 518 (June 5, 2019): 052020. http://dx.doi.org/10.1088/1757-899x/518/5/052020.
Full textBenjamin, Okike, and E. Garba. "Development of Okike’s Merged Irregular Transposition Cipher and Its Level Error." British Journal of Mathematics & Computer Science 7, no. 3 (2015): 229–40. http://dx.doi.org/10.9734/bjmcs/2015/14869.
Full textJain, Shipra, and Vishal Bhatnagar. "A Novel Ammonic Conversion Algorithm for Securing Data in DNA using Parabolic Encryption." Information Resources Management Journal 28, no. 2 (2015): 20–31. http://dx.doi.org/10.4018/irmj.2015040102.
Full textHandrizal, Jos Timanta Tarigan, and Doni Irwansyah Putra. "Implementation of Steganography Modified Least Significant Bit using the Columnar Transposition Cipher and Caesar Cipher Algorithm in Image Insertion." Journal of Physics: Conference Series 1898, no. 1 (2021): 012003. http://dx.doi.org/10.1088/1742-6596/1898/1/012003.
Full textP.Mohana Priya, P. Mohana Priya. "Hybrid Diagonal Transposition Cipher Model for Securing Data in Software Defined Networks." Journal of Science and Technology 7, no. 4 (2022): 60–87. http://dx.doi.org/10.46243/jst.2022.v7.i04.pp60-87.
Full textHandoko, Lekso Budi, and Chaerul Umam. "Data Security Using Color Image Based on Beaufort Cipher, Column Transposition and Least Significant Bit (LSB)." Journal of Applied Intelligent System 8, no. 2 (2023): 140–51. http://dx.doi.org/10.33633/jais.v8i2.7863.
Full textBramantya, Samuel Dwi, and Magdalena A. Ineke Pakereng. "Perancangan Kriptografi Blok Cipher Berbasis Pola Gambar Rumah Adat Joglo." Jurnal JTIK (Jurnal Teknologi Informasi dan Komunikasi) 7, no. 4 (2023): 629–38. http://dx.doi.org/10.35870/jtik.v7i4.1085.
Full text