Works matching DE "SUBSTITUTION ciphers"
1
- International Journal of Advanced Research in Computer Science, 2012, v. 3, n. 1, p. 328
- Som, Sukalyan;
- Sen, Arindam
- Article
2
- Historia Mexicana, 2013, v. 63, n. 1, p. 411
- Article
3
- Electronics Letters (Wiley-Blackwell), 2017, v. 53, n. 9, p. 604, doi. 10.1049/el.2017.0194
- Article
4
- Iraqi Journal of Science, 2021, v. 62, n. 9, p. 3237, doi. 10.24996/ijs.2021.62.9.36
- Salih, Raghad K.;
- Yousif, Madeha Sh.
- Article
5
- Multimedia Tools & Applications, 2017, v. 76, n. 10, p. 12659, doi. 10.1007/s11042-016-3689-3
- Chang, Chin-Chen;
- Huang, Ying-Hsuan;
- Lu, Tzu-Chuen
- Article
6
- Multimedia Tools & Applications, 2017, v. 76, n. 6, p. 8757, doi. 10.1007/s11042-016-3504-1
- Kumar, Sachin;
- Sharma, Rajendra
- Article
7
- Engineering, Technology & Applied Science Research, 2016, v. 6, n. 5, p. 1195, doi. 10.48084/etasr.729
- Elsharkawi, Abdelfattah;
- El-Sagheer, Ragab M.;
- Akah, Haitham;
- Taha, Hatem
- Article
8
- Critical Quarterly, 2013, v. 55, n. 4, p. 15, doi. 10.1111/criq.12072
- Article
9
- Cryptologia, 2016, v. 40, n. 4, p. 316, doi. 10.1080/01611194.2015.1055388
- Article
10
- Cryptologia, 2014, v. 38, n. 3, p. 232, doi. 10.1080/01611194.2014.915254
- Article
11
- Cryptologia, 2013, v. 37, n. 2, p. 120, doi. 10.1080/01611194.2012.660236
- Campbell, Samantha;
- Grinchenko, Max;
- Smith, William
- Article
12
- Przegląd Elektrotechniczny, 2017, v. 93, n. 1, p. 82, doi. 10.15199/48.2017.01.20
- Article
13
- Journal of Qadisiyah Computer Science & Mathematics, 2018, v. 10, n. 2, p. 54, doi. 10.29304/jqcm.2018.10.2.367
- Haroon, Zain-Ul-Abideen;
- Sarfraz, Muhammad;
- Li, Yongjin;
- Ali, Fateh;
- Rasheed, Akhter
- Article
14
- Ukrainian Scientific Journal of Information Security, 2014, v. 20, n. 2, p. 159, doi. 10.18372/2225-5036.20.7302
- Luzhetskiy, V.;
- Gorbenko, I.
- Article
15
- Security & Communication Networks, 2015, v. 8, n. 4, p. 672, doi. 10.1002/sec.1015
- Liu, Zhiqiang;
- Liu, Ya;
- Wang, Qingju;
- Gu, Dawu;
- Li, Wei
- Article