Substitution cipher

Results: 131



#Item
101Ciphertext / Stream cipher / Substitution cipher / Advantage / Data Encryption Standard / Symmetric-key algorithm / Cipher / Feistel cipher / Padding / Cryptography / Block cipher / One-time pad

Computer Security The science of managing malicious intent and behaviour that involves information and communication technology. Introduction to Security

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2008-06-03 04:22:03
102Cryptanalysis / Advantage / Cipher / Symmetric-key algorithm / Chosen-plaintext attack / Substitution cipher / Initialization vector / Ciphertext stealing / Cryptography / One-time pad / Ciphertext

Introduction to Security Markus Kuhn Computer Laboratory http://www.cl.cam.ac.uk/teaching/0708/IntroSec/

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2008-06-03 04:22:01
103Affine cipher / Caesar cipher / Ciphertext / Cipher / Cryptanalysis / Known-plaintext attack / One-time pad / Vigenère cipher / Transposition cipher / Cryptography / Stream ciphers / Substitution cipher

Cryptology: From Caesar Ciphers to Public-Key Cryptosystems Author(s): Dennis Luciano and Gordon Prichett Source: The College Mathematics Journal, Vol. 18, No. 1 (Jan., 1987), pp. 2-17

Add to Reading List

Source URL: www.math.sunysb.edu

Language: English - Date: 2010-04-15 11:12:49
104Vigenère cipher / Substitution cipher / Classical cipher / Block cipher / Caesar cipher / Cipher / Known-plaintext attack / Cryptanalysis / Symmetric-key algorithm / Cryptography / Stream ciphers / Ciphertext

22 Chapter 2

Add to Reading List

Source URL: www.eit.lth.se

Language: English - Date: 2008-11-05 05:17:40
105Data Encryption Standard / Keystream / Cryptanalysis / Chosen-plaintext attack / Block cipher / Substitution cipher / Running key cipher / Cryptography / Stream ciphers / Ciphertext

IEEE TRANSACTIONS ON INFORMATION

Add to Reading List

Source URL: www.cs.miami.edu

Language: English - Date: 2012-01-09 11:02:08
106Code / Communications security / Computer security / Transposition cipher / Signals intelligence / Cryptanalysis / Substitution cipher / Japanese cryptology from the 1500s to Meiji / Jefferson disk / Cryptography / Security / Espionage

e:;. . -- •.

Add to Reading List

Source URL: www.nsa.gov

Language: English - Date: 2009-01-23 11:14:40
107Enigma machine / Bombe / Reflector / Plugboard / Cryptanalysis / Purple / Substitution cipher / Cryptanalysis of the Enigma / Enigma rotor details / Cryptography / Rotor machines / Espionage

MowryBrochure - German Crypt. Equip1.qxd

Add to Reading List

Source URL: www.nsa.gov

Language: English - Date: 2009-01-13 11:15:06
108Cipher / Cyberwarfare / Espionage / Applied mathematics / Substitution cipher / Cryptography / Stream ciphers / Vigenère cipher

ECS 155, Computer Security for Non-Majors Fall Quarter 2005

Add to Reading List

Source URL: nob.cs.ucdavis.edu

Language: English - Date: 2005-11-15 00:52:15
109Ciphertext / Cipher / Transposition cipher / Stream cipher / Advanced Encryption Standard / Block cipher / Caesar cipher / Classical cipher / Cryptography / Permutations / Substitution cipher

CSC 405 Introduction to Computer Security Homework Assignment #1 Solutions

Add to Reading List

Source URL: discovery.csc.ncsu.edu

Language: English - Date: 2011-11-09 13:18:44
110Vigenère cipher / Hill cipher / Cryptanalysis / Rotor machine / Caesar cipher / Symmetric-key algorithm / Atbash / Enigma machine / Data Encryption Standard / Cryptography / Substitution cipher / Cipher

History of Cryptography This article is dedicated to a short history of cryptography, from ancient times to our days, without the

Add to Reading List

Source URL: www.logicalsecurity.com

Language: English - Date: 2008-09-10 02:14:47
UPDATE