Vigenère cipher

Results: 59



#Item
31Cipher / Cryptography / Vigenère cipher / Code

Read Across Rhode Island Mr. Penumbra’s Treasure Hunt Are you prepared to take the Penumbra challenge? Solve the puzzles in this treasure hunt for a chance to Win a Nook! at the May Breakfast. Below are the encrypt

Add to Reading List

Source URL: ricenterforthebook.files.wordpress.com

Language: English - Date: 2014-01-30 12:53:47
32Transposition cipher / Mathematics / Applied mathematics / Substitution cipher / Cryptography / Vigenère cipher / Cipher

Read Across Rhode Island Mr. Penumbra’s Treasure Hunt Are you prepared to take the Penumbra challenge? Solve the puzzles in this treasure hunt for a chance to Win a Nook! at the May Breakfast. Below are the encrypted n

Add to Reading List

Source URL: ricenterforthebook.files.wordpress.com

Language: English - Date: 2014-01-30 12:53:12
33Cipher / Key size / One-time pad / Cryptanalysis / Vigenère cipher / Substitution cipher / Alice and Bob / Key / Index of cryptography articles / Cryptography / Public-key cryptography / RSA

This article was published in 2003 and has not been updated or revised. ® BEYOND DISCOVERY T H E PAT H F R O M R E S E A R C H T O H U M A N B E N E F I T

Add to Reading List

Source URL: www.nasonline.org

Language: English - Date: 2014-08-04 15:09:41
34Vigenère cipher / Substitution cipher / Caesar cipher / Cryptanalysis / Block cipher / Keystream / Playfair cipher / Known-plaintext attack / Chosen-plaintext attack / Cryptography / Stream ciphers / Cipher

DOC Document

Add to Reading List

Source URL: www.gresham.ac.uk

Language: English - Date: 2013-10-22 10:31:56
35Differential cryptanalysis / Q / Product cipher / Cryptanalysis / Cipher / Substitution cipher / Permutation cipher / Vigenère cipher / Advanced Encryption Standard / Cryptography / Block ciphers / Permutations

COMP4140 Introduction to Cryptography and Cryptosystems

Add to Reading List

Source URL: www.cs.umanitoba.ca

Language: English - Date: 2007-11-06 12:31:11
36Substitution cipher / Ciphertext / Cipher / Known-plaintext attack / Unicity distance / Information theory / Cryptanalysis / Vigenère cipher / Affine cipher / Cryptography / Formal sciences / Science

Attacking Decipherment Problems Optimally with Low-Order N-gram Models Sujith Ravi and Kevin Knight University of Southern California Information Sciences Institute Marina del Rey, California 90292

Add to Reading List

Source URL: www.aclweb.org

Language: English - Date: 2010-06-14 16:48:29
37Transposition cipher / Vigenère cipher / Polyalphabetic cipher / Cryptanalysis / Enigma machine / Rotor machine / Classical cipher / Cryptography / Substitution cipher / Cipher

PDF Document

Add to Reading List

Source URL: www.nsa.gov

Language: English - Date: 2010-08-13 11:59:35
38Cyberwarfare / Espionage / Applied mathematics / Vigenère cipher / Cryptography / Cipher

DOCID: [removed]Non - Responsive CUi" iDLI 411/\1:

Add to Reading List

Source URL: www.nsa.gov

Language: English - Date: 2011-04-14 10:04:06
39Vigenère cipher / Cipher / Grille / Cryptanalysis / Cryptography / Permutations / Transposition cipher

DOCID: ,[removed]SECRET German Agent Systems of World War II BY FRANK W. LEWIS

Add to Reading List

Source URL: www.nsa.gov

Language: English - Date: 2011-04-14 10:04:06
40Cipher / Science / One-time pad / Cryptanalysis / Espionage / Substitution cipher / Vigenère cipher / Cryptography / Stream ciphers / Mathematical sciences

POCID: [removed]pproved for release by NSA on[removed], Transparency Case# 3852 IP er BY H. CAMPAIGNE

Add to Reading List

Source URL: www.nsa.gov

Language: English - Date: 2011-12-28 11:25:35
UPDATE