Works matching Substitution ciphers
1
- Ukrainian Scientific Journal of Information Security, 2014, v. 20, n. 2, p. 159, doi. 10.18372/2225-5036.20.7302
- Luzhetskiy, V.;
- Gorbenko, I.
- Article
2
- Engineering, Technology & Applied Science Research, 2016, v. 6, n. 5, p. 1195, doi. 10.48084/etasr.729
- Elsharkawi, Abdelfattah;
- El-Sagheer, Ragab M.;
- Akah, Haitham;
- Taha, Hatem
- Article
3
- Security & Communication Networks, 2015, v. 8, n. 4, p. 672, doi. 10.1002/sec.1015
- Liu, Zhiqiang;
- Liu, Ya;
- Wang, Qingju;
- Gu, Dawu;
- Li, Wei
- Article
4
- Cryptologia, 2013, v. 37, n. 3, p. 250, doi. 10.1080/01611194.2013.797041
- Dhavare, Amrapali;
- Low, Richard M.;
- Stamp, Mark
- Article
5
- Baghdad Science Journal, 2020, v. 17, n. 4, p. 1320, doi. 10.21123/bsj.2020.17.4.1320
- Ibraheem, Noor A.;
- Hasan, Mokhtar M
- Article
6
- Information Security Journal: A Global Perspective, 2018, v. 27, n. 1, p. 57, doi. 10.1080/19393555.2018.1426799
- Alkazaz, Noor R.;
- Irvine, Sean A.;
- Teahan, William J.
- Article
7
- Cryptologia, 2022, v. 46, n. 5, p. 422, doi. 10.1080/01611194.2021.1918801
- Article
8
- Cryptologia, 2020, v. 44, n. 3, p. 205, doi. 10.1080/01611194.2019.1655504
- Article
9
- Cryptologia, 2013, v. 37, n. 4, p. 338, doi. 10.1080/01611194.2013.797040
- Article
10
- Cryptologia, 2009, v. 33, n. 4, p. 321, doi. 10.1080/01611190903030920
- Ravi, Sujith;
- Knight, Kevin
- Article
11
- Cryptologia, 2007, v. 31, n. 4, p. 332, doi. 10.1080/01611190701272369
- Article
12
- International Journal of Advanced Research in Computer Science, 2012, v. 3, n. 1, p. 328
- Som, Sukalyan;
- Sen, Arindam
- Article
13
- Computer Systems Science & Engineering, 2021, v. 39, n. 1, p. 87, doi. 10.32604/csse.2021.05365
- Sabonchi, Arkan Kh Shakr;
- Akay, Bahriye
- Article
14
- Mathematica Montisnigri, 2019, v. 44, p. 135, doi. 10.20948/mathmon-2019-44-11
- BULATOVIĆ, LUKA;
- MIJANOVIĆ, ANĐELA;
- ASANOVIĆ, BALŠA;
- TRAJKOVIĆ, NIKOLA;
- BOŽOVIĆ, VLADIMIR
- Article
15
- Cryptologia, 2016, v. 40, n. 4, p. 316, doi. 10.1080/01611194.2015.1055388
- Article
16
- Al-Yarmouk Journal, 2019, v. 11, n. 1, p. 1
- Ibrahim, NuhaJameel;
- El-Hussien, Farah TawfiqAbd
- Article
17
- International Journal of Intelligent Engineering & Systems, 2021, v. 14, n. 2, p. 157, doi. 10.22266/ijies2021.0430.14
- Harjo, Budi;
- Ignatius Moses Setiadi, De Rosal
- Article
18
- Arabian Journal for Science & Engineering (Springer Science & Business Media B.V. ), 2020, v. 45, n. 12, p. 11019, doi. 10.1007/s13369-020-04919-3
- Shoukat, Ijaz Ali;
- Iqbal, Umer;
- Rauf, Abdul;
- Faheem, Muhammad Rehan
- Article
19
- Iraqi Journal of Science, 2021, v. 62, n. 9, p. 3237, doi. 10.24996/ijs.2021.62.9.36
- Salih, Raghad K.;
- Yousif, Madeha Sh.
- Article
20
- Electronic Turkish Studies, 2017, v. 12, n. 4, p. 23, doi. 10.7827/TurkishStudies.11337
- BAHADIR, Elif;
- KARAKUŞ, Neslihan
- Article
21
- Computational Intelligence & Neuroscience, 2022, p. 1, doi. 10.1155/2022/8338508
- Khan, Muhammad Fahad;
- Saleem, Khalid;
- Shah, Tariq;
- Hazzazi, Mohammad Mazyad;
- Bahkali, Ismail;
- Shukla, Piyush Kumar
- Article
22
- Critical Quarterly, 2013, v. 55, n. 4, p. 15, doi. 10.1111/criq.12072
- Article
23
- Monte Carlo Methods & Applications, 2016, v. 22, n. 4, p. 323, doi. 10.1515/mcma-2016-0116
- Fathi-Vajargah, Behrouz;
- Kanafchian, Mohadeseh
- Article
24
- Cryptologia, 2025, v. 49, n. 1, p. 15, doi. 10.1080/01611194.2023.2271466
- Article
25
- International Journal of Applied Metaheuristic Computing, 2019, v. 10, n. 2, p. 109, doi. 10.4018/IJAMC.2019040105
- Jain, Ashish;
- Chaudhari, Narendra S.
- Article
26
- Neural Computing & Applications, 2024, v. 36, n. 3, p. 1495, doi. 10.1007/s00521-023-09082-y
- Arshad, Razi;
- Jalil, Mudassar
- Article
27
- Neural Computing & Applications, 2013, v. 22, n. 6, p. 1085, doi. 10.1007/s00521-012-0870-0
- Hussain, Iqtadar;
- Shah, Tariq;
- Mahmood, Hasan;
- Gondal, Muhammad
- Article
28
- Engineering & Applied Science Research, 2020, v. 47, n. 1, p. 66, doi. 10.14456/easr.2020.6
- Kumar, Ashish;
- Raghava, N. S.
- Article
29
- TWMS Journal of Applied & Engineering Mathematics, 2021, v. 11, p. 154
- SHRUTHY, V. N. JAYA;
- MAHESWARI, V.
- Article
30
- Computer Journal, 1983, v. 26, n. 1, p. 68
- Hunter, D. G. N.;
- McKenzie, A. R.
- Article
31
- International Arab Journal of Information Technology (IAJIT), 2008, v. 5, n. 1, p. 87
- Toemeh, Ragheb;
- Arumugam, Subbanagounder
- Article
32
- Symmetry (20738994), 2024, v. 16, n. 8, p. 1051, doi. 10.3390/sym16081051
- Article
33
- Symmetry (20738994), 2022, v. 14, n. 11, p. 2372, doi. 10.3390/sym14112372
- Al-Daraiseh, Ahmad A.;
- Al-Muhammed, Muhammed J.
- Article
34
- International Review on Computers & Software, 2011, v. 6, n. 1, p. 40
- Jolfaei, Alireza;
- Mirghadri, Abdolrasoul
- Article
35
- Radioelectronic & Computer Systems / Radìoelektronnì ì Komp'ûternì Sistemi, 2023, n. 3, p. 150, doi. 10.32620/reks.2023.3.12
- LYSYTSKA, Iryna;
- LYSYTSKYI, Kostiantyn;
- NARIEZHNII, Oleksii;
- HRINENKO, Tetiana
- Article
36
- Przegląd Elektrotechniczny, 2017, v. 93, n. 1, p. 82, doi. 10.15199/48.2017.01.20
- Article
37
- Historia Mexicana, 2013, v. 63, n. 1, p. 411
- Article
38
- Arabian Journal for Science & Engineering (Springer Science & Business Media B.V. ), 2021, v. 46, n. 9, p. 8887, doi. 10.1007/s13369-021-05666-9
- Hayat, Umar;
- Azam, Naveed Ahmed;
- Gallegos-Ruiz, Homero Renato;
- Naz, Saima;
- Batool, Lubna
- Article
39
- Multimedia Tools & Applications, 2017, v. 76, n. 10, p. 12659, doi. 10.1007/s11042-016-3689-3
- Chang, Chin-Chen;
- Huang, Ying-Hsuan;
- Lu, Tzu-Chuen
- Article
40
- Multimedia Tools & Applications, 2017, v. 76, n. 6, p. 8757, doi. 10.1007/s11042-016-3504-1
- Kumar, Sachin;
- Sharma, Rajendra
- Article
41
- Electronics Letters (Wiley-Blackwell), 2017, v. 53, n. 9, p. 604, doi. 10.1049/el.2017.0194
- Article
42
- Security & Communication Networks, 2021, p. 1, doi. 10.1155/2021/3367521
- Murtaza, Ghulam;
- Azam, Naveed Ahmed;
- Hayat, Umar
- Article
43
- Cryptologia, 2014, v. 38, n. 3, p. 232, doi. 10.1080/01611194.2014.915254
- Article
44
- Cryptologia, 2013, v. 37, n. 2, p. 120, doi. 10.1080/01611194.2012.660236
- Campbell, Samantha;
- Grinchenko, Max;
- Smith, William
- Article
45
- Cryptologia, 1997, v. 21, n. 2, p. 129, doi. 10.1080/0161-119791885850
- Article
46
- Cryptologia, 1995, v. 19, n. 3, p. 265, doi. 10.1080/0161-119591883944
- Article
47
- Cryptologia, 1994, v. 18, n. 4, p. 332, doi. 10.1080/0161-119491882928
- Article
48
- Cryptologia, 1993, v. 17, n. 4, p. 407, doi. 10.1080/0161-119391868033
- Forsyth, W. S.;
- Safavi-Naini, R.
- Article
49
- Cryptologia, 1993, v. 17, n. 2, p. 202, doi. 10.1080/0161-119391867872
- Ramesh, R. S.;
- Athithan, G.;
- Thiruvengadam, K.
- Article
50
- Cryptologia, 1993, v. 17, n. 1, p. 31, doi. 10.1080/0161-119391867746
- Spillman, Richard;
- Janssen, Mark;
- Nelson, Bob;
- Kepner, Martin
- Article