Zobrazeno 1 - 10
of 506
pro vyhledávání: '"Playfair Cipher"'
Autor:
Salih, Raghad K.1 Raghad.k.Salih@uotechnology.edu.iq, Yousif, Madeha Sh.1
Publikováno v:
Iraqi Journal of Science. 2021, Vol. 62 Issue 9, p3237-3242. 6p.
Autor:
Sugirtham, N., Jenny, R. Sherine, Thiyaneswaran, B., Kumarganesh, S., Venkatesan, C., Sagayam, K. Martin, Dang, Lam, Dinh, Linh, Dang, Hien
Publikováno v:
International Journal of Networked & Distributed Computing; Jun2024, Vol. 12 Issue 1, p108-118, 11p
Publikováno v:
Baghdad Science Journal, Vol 21, Iss 1 (2024)
Cipher security is becoming an important step when transmitting important information through networks. The algorithms of cryptography play major roles in providing security and avoiding hacker attacks. In this work two hybrid cryptosystems have been
Externí odkaz:
https://doaj.org/article/6a592cc2ccca421ba30dd169fda10de9
Publikováno v:
Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi), Vol 4, Iss 3, Pp 454-461 (2020)
Message security is very important now. Because security is part of the privacy of someone who wants to protect messages from those who do not have the right to read or receive them. The method used for securing information messages with message encr
Externí odkaz:
https://doaj.org/article/a52846a529b7442b80679a1cc1a28478
Publikováno v:
Cryptologia. 2016, Vol. 40 Issue 2, p203-214. 12p.
Autor:
Habib, Hamza B.
Publikováno v:
Diyala Journal for Pure Science; Oct2019, Vol. 15 Issue 4, p74-84, 11p
Publikováno v:
Jurnal Minfo Polgan; Vol. 11 No. 1 (2022): Article Research; 9-14
The level of security and confidentiality of information / data becomes very important in the era of increasingly sophisticated and developing technology. Cryptographic methods can be one solution to overcome problems in the level of security and con
Autor:
Ian Blatchford
Publikováno v:
Science Museum Group Journal. 15
Autor:
Chiranji Lal Chowdhary, Pushpam Virenbhai Patel, Krupal Jaysukhbhai Kathrotia, Muhammad Attique, Kumaresan Perumal, Muhammad Fazal Ijaz
Publikováno v:
Sensors, Vol 20, Iss 18, p 5162 (2020)
The majority of imaging techniques use symmetric and asymmetric cryptography algorithms to encrypt digital media. Most of the research works contributed in the literature focus primarily on the Advanced Encryption Standard (AES) algorithm for encrypt
Externí odkaz:
https://doaj.org/article/e18ce1b555ce4e9bac5afb060bb5cb25
Autor:
Raghad K. Salih, Madeha Sh. Yousif
Publikováno v:
Iraqi Journal of Science. :3237-3242
Playfair cipher is a substitution scheme. The classical playfair scheme has a limited matrix size containing only uppercase letters, so it is prone to hackers and cryptanalysis. To increase the resistance of playfair cipher, a new encipherment and de