Author:
Saraswat Aditi,Khatri Chahat,Sudhakar ,Thakral Prateek,Biswas Prantik
Reference5 articles.
1. Nacira G Z,.Abdelaziz A. The θ -Vigenere Cipher Extended To Numerical Data, Proceedings of International Conference on Information and Communication Technologies: From Theory to Applications, 2004. DOI: 10.1109/ICTTA. 2004.1307807.
2. Senthil K, Prasanthi K, Rajaram R. A Modern Avatar Of Julius Caesar and Vigenere Cipher. Proceedings of IEEE International Conference on Computational Intelligence and Computing Research, 2013, Enathi, Tamilnadu, India. http://dx.doi.org/10.1109/ICCIC. 2013.6724109.
3. Blair A. Learning The Caesar And Vigenere Cipher by Hierarchical Evolutionary Re-combination, Proceedings of IEEE Congress on Evolutionary Computation June 20-23, Cancun, Mexico, 2013.
4. Pal J K, Mandal J K, Gupta S. Composite Transposition Substitution Chaining Based Cipher Technique, Proceedings of 16th International Conference on Advanced Computing and Communications, 2008, Chennai, Tamil Nadu India.
5. Piper F. Encryption.Proceedings of European Conference On Security and Detection, 28-30 April 1997, IEEE, 1997.
Cited by
17 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献