Search

Your search keyword '"Caesar cipher"' showing total 217 results

Search Constraints

Start Over You searched for: Descriptor "Caesar cipher" Remove constraint Descriptor: "Caesar cipher"
217 results on '"Caesar cipher"'

Search Results

1. Modified Caesar Cipher and Card Deck Shuffle Rearrangement Algorithm for Image Encryption.

2. Modified Caesar Cipher and Card Deck Shuffle Rearrangement Algorithm for Image Encryption

3. Secure Data Communication in a Clustered Network in Wireless Sensor Networks using AES Cipher.

4. A New Hybrid Diffie-Hellman and Caesar Cipher Algorithm for Cryptography.

5. Hiding algorithm based fused images and Caesar cipher with intelligent security enhancement.

6. A Comparative Study of a Hybrid Approach Combining Caesar Cipher with Triple Pass Protocol and Krill Herd Optimization Algorithm (KHO)-Based Hybridization.

7. Enhanced payload volume in the least significant bits image steganography using hash function.

8. A new encryption task for mathematically gifted students: Encryption arising from patterns.

9. Enhanced payload volume in the least significant bits image steganography using hash function

10. Text Encryption Analysis of Modified Symmetric Keys using Genetic Algorithm on Caesar Cipher and One Time Pad

13. Multistage Encryption for Text Using Steganography and Cryptography.

14. Securing Critical User Information over the Internet of Medical Things Platforms Using a Hybrid Cryptography Scheme.

15. Cryptography

16. Impact of Computational Power on Cryptography

17. Encryption and Decryption Scheme for IoT Communications Using Multilevel Encryption

18. Decoding Secret Message with Frequency Analysis

19. Enhancing Data Security in Cloud Using Split Algorithm, Caesar Cipher, and Vigenere Cipher, Homomorphism Encryption Scheme

20. Ensuring Security in Sharing of Information Using Cryptographic Technique

21. PENERAPAN KOMBINASI METODE VIGENERE CIPHER, CAESAR CIPHER DAN SIMBOL BACA DALAM MENGAMANKAN PESAN

22. Combination of Hill Cipher Algorithm and Caesar Cipher Algorithm for Exam Data Security

23. Securing Critical User Information over the Internet of Medical Things Platforms Using a Hybrid Cryptography Scheme

24. A Novel Text Encryption Algorithm Based on the Two-Square Cipher and Caesar Cipher

25. Let’s Get Digital: Computers in Cinema

26. Peningkatan Keamanan Kriptografi Caesar Cipher dengan Menerapkan Algoritma Kompresi Stout Codes

27. Introduction

28. Implementasi Algoritma Caesar Chiper dan Rail Fence untuk Peningkatan Keamanan Teks Berbasis Client Server

29. Comparison of Performance Rot13 and Caesar Cipher Method for Registration Database of Vessels Berthed at P.T. Samudera Indonesia

30. Implementasi Metode Kriptografi Caesar Cipher, DES dan Citra Digital menggunakan Metode Steganografi LSB

32. Modifikasi Kriptografi Klasik Kombinasi Metode Vigenere Cipher dan Caesar Cipher

33. Dihedral Cryptographic Technique.

34. Steganography Technique and Modification of Substitution Cipher Using ASCII Code and Fibonacci Sequences

35. Implementation & Comparative Analysis of RSA, Caesar Cipher and Playfair Cipher

36. Implementation of the data encryption using caesar cipher and vernam cipher methods based on CrypTool2

37. Perancangan Aplikasi Penyisipan Pesan pada File Mp3 menggunakan Metode Parity Coding dan Enkripsi Caesar Cipher

38. Encryption of Data based on Triple encryption and Affine Algorithm

40. A new Modified method of Cryptography using Caesar Cipher

41. NETWORK SECURITY BY BLOCK CIPHERS

42. Implementation of CAESAR CIPHER Cryptography Techniques for Android Based Information Data Security

43. Comparison Encryption of How to Work Caesar Cipher, Hill Cipher, Blowfish and Twofish

45. SISTEM STEGANOGRAPHY DENGAN METODE LEAST SIGNIFCANT BIT (LSB) & METODE CAESAR CIPHER BERBASIS ANDROID

46. Cryptography: A Combination of Caesar and Affine Cipher to Conceal the Message

47. Educational Application for Information Protection with the use of Cryptographic Methods - part I

48. An efficient hybrid technique for message encryption using caesar cipher and deoxyribonucleic acid steganography

49. An Extended Hybridization of Vigenere and Caesar Cipher Techniques for Secure Communication.

50. Mapping private keys into one public key using binary matrices and masonic cipher: Caesar cipher as a case study.

Catalog

Books, media, physical & digital resources