Works matching Ciphers
1
- Techno.com, 2024, v. 23, n. 4, p. 786, doi. 10.62411/tc.v23i4.11523
- Sutoyo, Muhammad Nurtanzis;
- Qammaddin;
- Rahayu;
- Ria Kariani, Ni Komang
- Article
2
- Techno.com, 2020, v. 19, n. 2, p. 168, doi. 10.33633/tc.v19i2.3322
- Andriani, Luluk;
- Rihartanto;
- Putra, Arief Bramanto Wicaksono
- Article
3
- Symmetry (20738994), 2019, v. 11, n. 12, p. 1485, doi. 10.3390/sym11121485
- Article
4
- Vietnam Journal of Computer Science (World Scientific), 2024, v. 11, n. 4, p. 553, doi. 10.1142/S2196888824500143
- Article
5
- Journal of Mathematical Models in Engineering, 2022, v. 8, n. 2, p. 15, doi. 10.21595/mme.2022.22517
- Mihalkovich, A.;
- Levinskas, M.;
- Makauskas, P.
- Article
6
- Journal of the Korea Institute of Information & Communication Engineering, 2019, v. 23, n. 7, p. 875, doi. 10.6109/jkiice.2019.23.7.875
- Article
7
- International Journal of Advanced Research in Computer Science, 2018, v. 9, n. 1, p. 276, doi. 10.26483/ijarcs.v9i1.5206
- Pandey, Ashish;
- Pandey, Stuti;
- Agarwal, Abhay Kumar
- Article
8
- International Journal of Advanced Research in Computer Science, 2017, v. 8, n. 5, p. 372
- Bhat, Krishnaraj;
- Mahto, Dindayal;
- Yadav, Dilip Kumar
- Article
9
- International Journal of Advanced Research in Computer Science, 2017, v. 8, n. 3, p. 379
- Bhat, Krishnaraj;
- Mahto, Dindayal;
- Yadav, Dilip Kumar
- Article
10
- IET Information Security (Wiley-Blackwell), 2020, v. 14, n. 1, p. 72, doi. 10.1049/iet-ifs.2018.5252
- Eskandari, Zahra;
- Ghaemi Bafghi, Abbas
- Article
11
- IET Information Security (Wiley-Blackwell), 2018, v. 12, n. 6, p. 484, doi. 10.1049/iet-ifs.2017.0553
- Jiao, Lin;
- Li, Yongqiang;
- Hao, Yonglin
- Article
12
- IET Information Security (Wiley-Blackwell), 2017, v. 11, n. 5, p. 230, doi. 10.1049/iet-ifs.2016.0014
- Yang, Dong;
- Qi, Wen‐Feng;
- Tian, Tian
- Article
13
- IET Information Security (Wiley-Blackwell), 2014, v. 8, n. 3, p. 207, doi. 10.1049/iet-ifs.2011.0332
- Article
14
- Malaysian Journal of Mathematical Sciences, 2021, v. 15, p. 141
- Article
15
- ICTACT Journal on Communication Technology, 2025, v. 16, n. 1, p. 3432, doi. 10.21917/ijct.2025.0509
- Musthafa, M. Mohamed;
- Thangavel, P.;
- Paul, Anand
- Article
16
- Telkomnika, 2024, v. 22, n. 2, p. 351, doi. 10.12928/TELKOMNIKA.v22i2.25628
- Azanuddin;
- Kartadie, Rikie;
- Erwis, Fauzi;
- Boy, Ahmad Fitri;
- Nasyuha, Asyahri Hadi
- Article
17
- Cybersecurity (2523-3246), 2023, v. 6, n. 1, p. 1, doi. 10.1186/s42400-022-00136-7
- Rana, Sohel;
- Mondal, M. Rubaiyat Hossain;
- Kamruzzaman, Joarder
- Article
18
- Iraqi Journal of Science, 2024, v. 65, n. 10, p. 5819, doi. 10.24996/ijs.2024.65.10.39
- Qassir, Samar Amil;
- Gaata, Methaq Talib;
- Sadiq, Ahmed T.;
- Taha, Imad Fakhri
- Article
19
- Symmetry (20738994), 2020, v. 12, n. 5, p. 860, doi. 10.3390/sym12050860
- Sakalauskas, Eligijus;
- Dindienė, Lina;
- Kilčiauskas, Aušrys;
- Lukšys, Kȩstutis
- Article
20
- Quantum Information Processing, 2022, v. 21, n. 6, p. 1, doi. 10.1007/s11128-022-03505-w
- Zhang, Zhongya;
- Wu, Wenling;
- Sui, Han;
- Li, Xiaodan
- Article
21
- International Journal of Intelligent Engineering & Systems, 2019, v. 12, n. 4, p. 71, doi. 10.22266/ijies2019.0831.08
- Sehrawat, Deepti;
- Gill, Nasib Singh
- Article
22
- Baghdad Science Journal, 2024, v. 21, n. 1, p. 151, doi. 10.21123/bsj.2023.8361
- Suhael, Saja Mohammed;
- Ahmed, Zaynab Anwer;
- Hussain, Abir Jaafer
- Article
23
- Informatica (03505596), 2022, v. 46, n. 7, p. 95, doi. 10.31449/inf.v46i7.4279
- Muhalhal, Lamia A.;
- Alshawi, Imad S.
- Article
24
- Cryptologia, 2023, v. 47, n. 1, p. 38, doi. 10.1080/01611194.2021.1992686
- Article
25
- Cryptologia, 2020, v. 44, n. 3, p. 197, doi. 10.1080/01611194.2019.1657202
- Park, Seongmin;
- Kim, Juneyeun;
- Cho, Kookrae;
- Yum, Dae Hyun
- Article
26
- Cryptologia, 2017, v. 41, n. 2, p. 172, doi. 10.1080/01611194.2016.1219787
- Article
27
- Cryptologia, 2016, v. 40, n. 1, p. 33, doi. 10.1080/01611194.2015.1028679
- Article
28
- Cryptologia, 2013, v. 37, n. 4, p. 338, doi. 10.1080/01611194.2013.797040
- Article
29
- Security & Communication Networks, 2016, v. 9, n. 11, p. 1450, doi. 10.1002/sec.1431
- Manasrah, Ahmad M.;
- Al-Din, Basim Najim
- Article
30
- Energies (19961073), 2022, v. 15, n. 19, p. 6864, doi. 10.3390/en15196864
- Sawka, Maciej;
- Niemiec, Marcin
- Article
31
- Nonlinear Dynamics, 2011, v. 63, n. 4, p. 587, doi. 10.1007/s11071-010-9821-4
- Xingyuan Wang;
- Xiaojuan Wang;
- Jianfeng Zhao;
- Zhenfeng Zhang
- Article
32
- Grenze International Journal of Engineering & Technology (GIJET), 2023, v. 9, n. 2, p. 358
- Mudliar, Urvi;
- Zope, Khushi;
- Lohakare, Prathamesh;
- Tarate, Apeksha;
- Gore, Deipali V.
- Article
33
- Computer Journal, 2024, v. 67, n. 2, p. 674, doi. 10.1093/comjnl/bxad009
- Zhang, Li;
- Zhang, Yu;
- Wu, Wenling;
- Mao, Yongxia;
- Zheng, Yafei
- Article
34
- Computer Journal, 2017, v. 60, n. 12, p. 1839, doi. 10.1093/comjnl/bxx068
- Article
35
- Electronic Science & Technology, 2023, v. 36, n. 9, p. 15, doi. 10.16180/j.cnki.issn1007-7820.2023.09.003
- Article
36
- Telecommunication Engineering, 2023, v. 63, n. 9, p. 1391, doi. 10.20079/j.issn.1001-893x.220617001
- Article
37
- IEEE Internet Computing, 2015, v. 19, n. 1, p. 80, doi. 10.1109/MIC.2015.3
- Herzberg, Amir;
- Shulman, Haya
- Article
38
- Optical & Quantum Electronics, 2025, v. 57, n. 1, p. 1, doi. 10.1007/s11082-024-08024-9
- Li, Zhao-Yun;
- Zhang, Yu-Kun;
- Pang, Hai-Yue;
- Luo, Qing-Song;
- Zhang, Xin;
- Tao, Zhi-Yong;
- Fan, Ya-Xian
- Article
39
- International Journal of Industrial Electronics Control & Optimization, 2024, v. 7, n. 1, p. 41
- Article
40
- International Journal of Mathematical Education in Science & Technology, 2008, v. 39, n. 7, p. 967, doi. 10.1080/00207390802054508
- Article
41
- International Journal of Advanced Research in Computer Science, 2014, v. 5, n. 4, p. 67
- Ghosh, Chinmoy;
- Mandal, Satyendra Nath
- Article
42
- International Journal of Advanced Research in Computer Science, 2011, v. 2, n. 3, p. 496
- Varanasi, Aruna;
- Sastry, V. U. K.;
- Kuma, S. Udaya
- Article
43
- International Journal of Advanced Research in Computer Science, 2011, v. 2, n. 3, p. 208
- Kallam, Ravindra Babu;
- Kumar, S. Udaya;
- Babu, A. Vinaya
- Article
44
- International Journal of Advanced Research in Computer Science, 2011, v. 2, n. 3, p. 460
- Varanasi, Aruna;
- Sastry, V. U. K.;
- Kumar, S. Udaya
- Article
45
- Neural Computing & Applications, 2025, v. 37, n. 5, p. 4075, doi. 10.1007/s00521-024-10734-w
- Najeeb, Mahira;
- Ghulam, Zikra;
- Pervaiz, Zahid;
- Masood, Ammar
- Article
46
- Multimedia Tools & Applications, 2022, v. 81, n. 10, p. 14403, doi. 10.1007/s11042-022-12043-7
- Hariss, Khalil;
- Noura, Hassan
- Article
47
- IET Information Security (Wiley-Blackwell), 2023, v. 17, n. 3, p. 347, doi. 10.1049/ise2.12099
- Lin, Dongdong;
- Li, Manman;
- Hou, Zezhou;
- Chen, Shaozhen
- Article
48
- ISeCure, 2010, v. 2, n. 1, p. 3
- Article
49
- Journal of Information Assurance & Security, 2017, v. 12, n. 3, p. 94
- Chefranov, Alexander;
- Dukhnich, Evgeny
- Article
50
- Cybersecurity (2523-3246), 2023, v. 6, n. 1, p. 1, doi. 10.1186/s42400-023-00184-7
- Liu, Yuting;
- Li, Yongqiang;
- Chen, Huiqin;
- Wang, Mingsheng
- Article