Works matching Ciphers
1
- Techno.com, 2024, v. 23, n. 4, p. 786, doi. 10.62411/tc.v23i4.11523
- Sutoyo, Muhammad Nurtanzis;
- Qammaddin;
- Rahayu;
- Ria Kariani, Ni Komang
- Article
2
- Symmetry (20738994), 2019, v. 11, n. 12, p. 1485, doi. 10.3390/sym11121485
- Article
3
- Techno.com, 2020, v. 19, n. 2, p. 168, doi. 10.33633/tc.v19i2.3322
- Andriani, Luluk;
- Rihartanto;
- Putra, Arief Bramanto Wicaksono
- Article
4
- Grenze International Journal of Engineering & Technology (GIJET), 2023, v. 9, n. 2, p. 358
- Mudliar, Urvi;
- Zope, Khushi;
- Lohakare, Prathamesh;
- Tarate, Apeksha;
- Gore, Deipali V.
- Article
5
- Malaysian Journal of Mathematical Sciences, 2021, v. 15, p. 141
- Article
6
- Telkomnika, 2024, v. 22, n. 2, p. 351, doi. 10.12928/TELKOMNIKA.v22i2.25628
- Azanuddin;
- Kartadie, Rikie;
- Erwis, Fauzi;
- Boy, Ahmad Fitri;
- Nasyuha, Asyahri Hadi
- Article
7
- Quantum Information Processing, 2022, v. 21, n. 6, p. 1, doi. 10.1007/s11128-022-03505-w
- Zhang, Zhongya;
- Wu, Wenling;
- Sui, Han;
- Li, Xiaodan
- Article
8
- Iraqi Journal of Science, 2024, v. 65, n. 10, p. 5819, doi. 10.24996/ijs.2024.65.10.39
- Qassir, Samar Amil;
- Gaata, Methaq Talib;
- Sadiq, Ahmed T.;
- Taha, Imad Fakhri
- Article
9
- Energies (19961073), 2022, v. 15, n. 19, p. 6864, doi. 10.3390/en15196864
- Sawka, Maciej;
- Niemiec, Marcin
- Article
10
- Informatica (03505596), 2022, v. 46, n. 7, p. 95, doi. 10.31449/inf.v46i7.4279
- Muhalhal, Lamia A.;
- Alshawi, Imad S.
- Article
11
- Computer Journal, 2024, v. 67, n. 2, p. 674, doi. 10.1093/comjnl/bxad009
- Zhang, Li;
- Zhang, Yu;
- Wu, Wenling;
- Mao, Yongxia;
- Zheng, Yafei
- Article
12
- Computer Journal, 2017, v. 60, n. 12, p. 1839, doi. 10.1093/comjnl/bxx068
- Article
13
- International Journal of Intelligent Engineering & Systems, 2019, v. 12, n. 4, p. 71, doi. 10.22266/ijies2019.0831.08
- Sehrawat, Deepti;
- Gill, Nasib Singh
- Article
14
- Security & Communication Networks, 2016, v. 9, n. 11, p. 1450, doi. 10.1002/sec.1431
- Manasrah, Ahmad M.;
- Al-Din, Basim Najim
- Article
15
- Cybersecurity (2523-3246), 2023, v. 6, n. 1, p. 1, doi. 10.1186/s42400-022-00136-7
- Rana, Sohel;
- Mondal, M. Rubaiyat Hossain;
- Kamruzzaman, Joarder
- Article
16
- Symmetry (20738994), 2020, v. 12, n. 5, p. 860, doi. 10.3390/sym12050860
- Sakalauskas, Eligijus;
- Dindienė, Lina;
- Kilčiauskas, Aušrys;
- Lukšys, Kȩstutis
- Article
17
- Baghdad Science Journal, 2024, v. 21, n. 1, p. 151, doi. 10.21123/bsj.2023.8361
- Suhael, Saja Mohammed;
- Ahmed, Zaynab Anwer;
- Hussain, Abir Jaafer
- Article
18
- Nonlinear Dynamics, 2011, v. 63, n. 4, p. 587, doi. 10.1007/s11071-010-9821-4
- Xingyuan Wang;
- Xiaojuan Wang;
- Jianfeng Zhao;
- Zhenfeng Zhang
- Article
19
- International Journal of Advanced Research in Computer Science, 2018, v. 9, n. 1, p. 276, doi. 10.26483/ijarcs.v9i1.5206
- Pandey, Ashish;
- Pandey, Stuti;
- Agarwal, Abhay Kumar
- Article
20
- International Journal of Advanced Research in Computer Science, 2017, v. 8, n. 5, p. 372
- Bhat, Krishnaraj;
- Mahto, Dindayal;
- Yadav, Dilip Kumar
- Article
21
- International Journal of Advanced Research in Computer Science, 2017, v. 8, n. 3, p. 379
- Bhat, Krishnaraj;
- Mahto, Dindayal;
- Yadav, Dilip Kumar
- Article
22
- Cryptologia, 2023, v. 47, n. 1, p. 38, doi. 10.1080/01611194.2021.1992686
- Article
23
- Cryptologia, 2020, v. 44, n. 3, p. 197, doi. 10.1080/01611194.2019.1657202
- Park, Seongmin;
- Kim, Juneyeun;
- Cho, Kookrae;
- Yum, Dae Hyun
- Article
24
- Cryptologia, 2017, v. 41, n. 2, p. 172, doi. 10.1080/01611194.2016.1219787
- Article
25
- Cryptologia, 2016, v. 40, n. 1, p. 33, doi. 10.1080/01611194.2015.1028679
- Article
26
- Cryptologia, 2013, v. 37, n. 4, p. 338, doi. 10.1080/01611194.2013.797040
- Article
27
- IET Information Security (Wiley-Blackwell), 2020, v. 14, n. 1, p. 72, doi. 10.1049/iet-ifs.2018.5252
- Eskandari, Zahra;
- Ghaemi Bafghi, Abbas
- Article
28
- IET Information Security (Wiley-Blackwell), 2018, v. 12, n. 6, p. 484, doi. 10.1049/iet-ifs.2017.0553
- Jiao, Lin;
- Li, Yongqiang;
- Hao, Yonglin
- Article
29
- IET Information Security (Wiley-Blackwell), 2017, v. 11, n. 5, p. 230, doi. 10.1049/iet-ifs.2016.0014
- Yang, Dong;
- Qi, Wen‐Feng;
- Tian, Tian
- Article
30
- IET Information Security (Wiley-Blackwell), 2014, v. 8, n. 3, p. 207, doi. 10.1049/iet-ifs.2011.0332
- Article
31
- Vietnam Journal of Computer Science (World Scientific), 2024, v. 11, n. 4, p. 553, doi. 10.1142/S2196888824500143
- Article
32
- Journal of Mathematical Models in Engineering, 2022, v. 8, n. 2, p. 15, doi. 10.21595/mme.2022.22517
- Mihalkovich, A.;
- Levinskas, M.;
- Makauskas, P.
- Article
33
- Telecommunication Engineering, 2025, v. 65, n. 7, p. 1069, doi. 10.20079/j.issn.1001-893x.241118005
- Article
34
- Journal of the Korea Institute of Information & Communication Engineering, 2019, v. 23, n. 7, p. 875, doi. 10.6109/jkiice.2019.23.7.875
- Article
35
- ICTACT Journal on Communication Technology, 2025, v. 16, n. 1, p. 3432, doi. 10.21917/ijct.2025.0509
- Musthafa, M. Mohamed;
- Thangavel, P.;
- Paul, Anand
- Article
36
- African Journal of Science, Technology, Innovation & Development, 2025, v. 17, n. 4, p. 565, doi. 10.1080/20421338.2025.2490357
- Aksa, Karima;
- Larbi, Oussama;
- Fourar, Amira
- Article
37
- Electronic Science & Technology, 2023, v. 36, n. 9, p. 15, doi. 10.16180/j.cnki.issn1007-7820.2023.09.003
- Article
38
- International Journal of Mathematical Education in Science & Technology, 2008, v. 39, n. 7, p. 967, doi. 10.1080/00207390802054508
- Article
39
- TWMS Journal of Applied & Engineering Mathematics, 2021, v. 11, p. 154
- SHRUTHY, V. N. JAYA;
- MAHESWARI, V.
- Article
40
- International Journal of Electrical & Computer Engineering (2088-8708), 2021, v. 11, n. 5, p. 4449, doi. 10.11591/ijece.v11i5.pp4449-4457
- Mezher, Liqaa Saadi;
- Abbass, Ayam Mohsen
- Article
41
- International Journal of Electrical & Computer Engineering (2088-8708), 2020, v. 10, n. 5, p. 5470, doi. 10.11591/ijece.v10i5.pp5470-5478
- Minh Nguyen Hieu;
- Duy Ho Ngoc;
- Canh Hoang Ngoc;
- Trung Dinh Phuong;
- Manh Tran Cong
- Article
42
- eLearning & Software for Education, 2017, v. 1, p. 342, doi. 10.12753/2066-026X-17-050
- NAYDENOVA BORODZHIEVA, Adriana
- Article
43
- Quantum Information Processing, 2023, v. 22, n. 9, p. 1, doi. 10.1007/s11128-023-04098-8
- Article
44
- Quantum Information Processing, 2023, v. 22, n. 1, p. 1, doi. 10.1007/s11128-022-03752-x
- Sun, Hong-Wei;
- Wei, Chun-Yan;
- Cai, Bin-Bin;
- Qin, Su-Juan;
- Wen, Qiao-Yan;
- Gao, Fei
- Article
45
- Multimedia Tools & Applications, 2022, v. 81, n. 10, p. 14403, doi. 10.1007/s11042-022-12043-7
- Hariss, Khalil;
- Noura, Hassan
- Article
46
- Multimedia Tools & Applications, 2020, v. 79, n. 19/20, p. 13559, doi. 10.1007/s11042-020-08613-2
- Couturier, Raphaël;
- Noura, Hassan N.;
- Chehab, Ali
- Article
47
- Multimedia Tools & Applications, 2019, v. 78, n. 23, p. 33527, doi. 10.1007/s11042-019-08112-z
- Qumsieh, Rawan;
- Farajallah, Mousa;
- Hamamreh, Rushdi
- Article
48
- Multimedia Tools & Applications, 2019, v. 78, n. 11, p. 14837, doi. 10.1007/s11042-018-6845-0
- Noura, Hassan N.;
- Noura, Mohamad;
- Chehab, Ali;
- Mansour, Mohammad M.;
- Couturier, Raphaël
- Article
49
- Multimedia Tools & Applications, 2017, v. 76, n. 6, p. 8757, doi. 10.1007/s11042-016-3504-1
- Kumar, Sachin;
- Sharma, Rajendra
- Article
50
- Journal of Electronic Imaging, 2022, v. 31, n. 6, p. 63036, doi. 10.1117/1.JEI.31.6.063036
- Kumari, Manisha;
- Singh, Pulkit;
- Acharya, Bibhudendra
- Article