Works matching Vigenère cipher
Results: 16
Composite Cryptographic Methodologies for Data Transmission Model using Modified Vigenère and Extended Polybius Cipher.
- Published in:
- Grenze International Journal of Engineering & Technology (GIJET), 2023, v. 9, n. 2, p. 358
- By:
- Publication type:
- Article
A Novel Encryption Approach Based on Vigenère Cipher for Secure Data Communication.
- Published in:
- Wireless Personal Communications, 2021, v. 119, n. 2, p. 1577, doi. 10.1007/s11277-021-08295-5
- By:
- Publication type:
- Article
Cryptanalysis of image scrambling based on chaotic sequences and Vigenère cipher.
- Published in:
- Nonlinear Dynamics, 2014, v. 78, n. 1, p. 235, doi. 10.1007/s11071-014-1435-9
- By:
- Publication type:
- Article
Securing DICOM images by a new encryption algorithm using Arnold transform and Vigenère cipher.
- Published in:
- IET Image Processing (Wiley-Blackwell), 2020, v. 14, p. 1209, doi. 10.1049/iet-ipr.2019.0042
- By:
- Publication type:
- Article
THE VIGENÈRE CIPHER.
- Published in:
- Transylvanian Journal of Mathematics & Mechanics, 2022, v. 14, n. 1, p. 43
- By:
- Publication type:
- Article
THE VIGENÈRE CIPHER WITH THE TI-83.
- Published in:
- Mathematics & Computer Education, 2004, v. 38, n. 1, p. 19
- By:
- Publication type:
- Article
A Modified Vigenère Cipher based on Time and Biometrics features.
- Published in:
- Journal of Engineering (17264073), 2023, v. 29, n. 6, p. 128, doi. 10.31026/j.eng.2023.06.10
- By:
- Publication type:
- Article
Anonymous marking of coursework using a Vigenère-type cipher.
- Published in:
- British Journal of Educational Technology, 2011, v. 42, n. 6, p. E156, doi. 10.1111/j.1467-8535.2011.01230.x
- By:
- Publication type:
- Article
Hybrid Cryptography DNA-Based Vigenère Cipher for Secure File Encryption.
- Published in:
- International Scientific Journal of Engineering & Management, 2024, v. 3, n. 11, p. 1, doi. 10.55041/ISJEM02134
- By:
- Publication type:
- Article
Image scrambling based on chaotic sequences and Veginère cipher.
- Published in:
- Multimedia Tools & Applications, 2013, v. 66, n. 3, p. 573, doi. 10.1007/s11042-012-1281-z
- By:
- Publication type:
- Article
Two-Layer Security Algorithms to Prevent Attacks on Data in Cyberspace.
- Published in:
- Applied Sciences (2076-3417), 2022, v. 12, n. 19, p. 9736, doi. 10.3390/app12199736
- By:
- Publication type:
- Article
Chaotic Image Encryption Scheme Based on Improved Z‐Order Curve, Modified Josephus Problem, and RNA Operations: An Experimental Li‐Fi Approach.
- Published in:
- Complexity, 2024, v. 2024, p. 1, doi. 10.1155/cplx/2910833
- By:
- Publication type:
- Article
I, Claudius and the cipher extraordinary.
- Published in:
- Mathematical Gazette, 2012, v. 96, n. 537, p. 466, doi. 10.1017/s002555720000509x
- By:
- Publication type:
- Article
Improved Color Image Encryption using Hybrid Modulus Substitution Cipher and Chaotic Method.
- Published in:
- International Journal of Intelligent Engineering & Systems, 2021, v. 14, n. 2, p. 157, doi. 10.22266/ijies2021.0430.14
- By:
- Publication type:
- Article
SECURING COMMUNICATION IN CHATTER APPLICATION.
- Published in:
- Annals of DAAAM & Proceedings, 2021, v. 32, p. 90, doi. 10.2507/32nd.daaam.proceedings.013
- By:
- Publication type:
- Article
Embedding Permanent Watermarks in Synthetic Genes.
- Published in:
- PLoS ONE, 2012, v. 7, n. 8, p. 1, doi. 10.1371/journal.pone.0042465
- By:
- Publication type:
- Article