Affine cipher

Results: 27



#Item
21Modular arithmetic / Public-key cryptography / Euclidean algorithm / Merkle–Hellman knapsack cryptosystem / Linear congruence theorem / Quadratic residue / Affine cipher / Classical cipher / Cryptography / Mathematics / Number theory

A Comment on \A New Public{Key Cipher System Based Upon the Diophantine Equations" S.R. Blackburn, S. Murphyyand K.G. Patersonz Information Security Group, Royal Holloway, University of London, Surrey TW20 0EX, U.K.

Add to Reading List

Source URL: www.isg.rhul.ac.uk

Language: English - Date: 2005-11-30 04:39:34
22Caesar cipher / Substitution cipher / Enigma machine / Classical cipher / Modulo operation / Bombe / RSA / Affine cipher / Cryptography / Vigenère cipher / Bletchley Park

Example 1: Student work Breaking the Code “To keep your secret is wisdom; but to expect others to keep it is folly.” Samuel Johnson “Secrets are made to be found out with time”

Add to Reading List

Source URL: library.tedankara.k12.tr

Language: English - Date: 2012-11-11 10:12:40
23Caesar cipher / Substitution cipher / Enigma machine / Modulo operation / RSA / Bombe / Cryptanalysis / Classical cipher / Affine cipher / Cryptography / Vigenère cipher / Bletchley Park

Example 1: Student work Breaking the Code “To keep your secret is wisdom; but to expect others to keep it is folly.” Samuel Johnson “Secrets are made to be found out with time”

Add to Reading List

Source URL: library.tedankara.k12.tr

Language: English - Date: 2012-11-11 10:11:46
24Affine cipher / Caesar cipher / Ciphertext / Cipher / Cryptanalysis / Known-plaintext attack / One-time pad / Vigenère cipher / Transposition cipher / Cryptography / Stream ciphers / Substitution cipher

Cryptology: From Caesar Ciphers to Public-Key Cryptosystems Author(s): Dennis Luciano and Gordon Prichett Source: The College Mathematics Journal, Vol. 18, No. 1 (Jan., 1987), pp. 2-17

Add to Reading List

Source URL: www.math.sunysb.edu

Language: English - Date: 2010-04-15 11:12:49
25Homomorphism / Cipher / RSA / Homomorphic encryption / Mathematics / Cyberwarfare / Applied mathematics / Affine cipher / Group homomorphism / Cryptography / Public-key cryptography / Morphisms

ON DATA BANKS AND PRIVACY HOMOMORPHISMS Ronald L. Rivest Len Adleman

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2010-03-22 19:22:20
26Cipher / Atbash / Classical cipher / Cryptography / Affine cipher / Caesar cipher

PDF Document

Add to Reading List

Source URL: www.math.cornell.edu

Language: English - Date: 2006-07-04 22:22:12
27Classical cipher / Applied mathematics / Affine cipher / Substitution cipher / Stream ciphers / Cipher

Untitled

Add to Reading List

Source URL: aclweb.org

Language: English
UPDATE