Substitution cipher

Results: 131



#Item
21Cryptanalysis / Ciphertext / Known-plaintext attack / Caesar cipher / Cipher / Substitution cipher / Cryptography / Stream ciphers / Vigenère cipher

CIS 331 Introduction to Networks & Security January 21, 2014 Homework 1: Threat Modeling and Cryptanalysis

Add to Reading List

Source URL: www.cis.upenn.edu

Language: English - Date: 2014-11-18 15:19:13
22Cipher / Block cipher / Public-key cryptography / Key / RSA / Substitution cipher / One-time pad / Stream cipher / Index of cryptography articles / Cryptography / Symmetric-key algorithm / Ciphertext

Public Key Infrastructure PKI Michael Maass and Blase Ur 1

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2011-10-25 17:46:07
23Cryptanalysis / Chosen-plaintext attack / Ciphertext / Advantage / Stream ciphers / Cryptography / Cellular Message Encryption Algorithm / Substitution cipher

Cryptanalysis of the Cellular Message Encryption Algorithm David Wagner Bruce Schneier John Kelsey University of California, Berkeley

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:30
24Substitution-permutation network / Weak key / Key schedule / Camellia / GOST / Data Encryption Standard / Blowfish / Cryptography / Feistel cipher / ICE

Complementing Feistel Ciphers? Alex Biryukov1 and Ivica Nikoli´c2 1 University of Luxembourg Nanyang Technological University, Singapore

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-05-05 12:02:44
25Substitution cipher / Ciphertext / Cipher / Keystream / ICE / Cryptography / Stream ciphers / Advanced Encryption Standard

Whitenoise Laboratories Inc. Software Specifications For Tinnitus Utilizing Whitenoise Substitution

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2004-02-25 12:31:39
26Substitution cipher / Cryptanalysis / Caesar cipher / Classical cipher / Playfair cipher / Block cipher / Symmetric-key algorithm / Hill cipher / Transposition cipher / Cryptography / Cipher / Vigenère cipher

Lecture 2: Classical Encryption Techniques Lecture Notes on “Computer and Network Security” by Avi Kak ([removed]) January 20, 2015 9:44pm c

Add to Reading List

Source URL: engineering.purdue.edu

Language: English - Date: 2015-04-19 11:00:38
27Cipher / Substitution cipher / Playfair cipher / Caesar cipher / Block cipher / Transposition cipher / Cryptanalysis / One-time pad / Advanced Encryption Standard / Cryptography / Stream ciphers / Ciphertext

Microsoft PowerPoint - 02-classical_encryption.pptx

Add to Reading List

Source URL: faculty.ksu.edu.sa

Language: English - Date: 2009-03-05 06:09:13
28Block cipher / Cipher / Stream cipher / Advanced Encryption Standard / ICE / Symmetric-key algorithm / Substitution cipher / S-box / Crypt / Cryptography / Data Encryption Standard / Ciphertext

SFWR 4C03: Computer Networks and Computer Security Mar[removed]Lecturer: Kartik Krishnan

Add to Reading List

Source URL: www4.ncsu.edu

Language: English - Date: 2005-12-03 12:37:56
29Block cipher modes of operation / N-gram / Language model / One-time pad / Cryptanalysis / Substitution cipher / ICE / RC4 / Plaintext / Cryptography / Stream ciphers / Keystream

A Natural Language Approach to Automated Cryptanalysis of Two-time Pads Joshua Mason Kathryn Watkins

Add to Reading List

Source URL: www.cs.jhu.edu

Language: English - Date: 2006-09-28 16:26:57
30Data Encryption Standard / One-time pad / Stream cipher / Substitution cipher / Cryptography / Cryptanalysis / Cipher

Internet Watch Cryptography: Is Staying with the Herd Really Best?

Add to Reading List

Source URL: www.ciphersbyritter.com

Language: English - Date: 2007-08-30 22:44:30
UPDATE