Enhancement Caesar Cipher for Better Security (original) (raw)

A REVIEW ON ENHANCING CAESAR CIPHER

IJRMS Journal

View PDFchevron_right

ENHANCING SECURITY OF CAESAR CIPHER USING DIFFERENT METHODS

Editor IJRET

View PDFchevron_right

AN IMPROVISED CAESAR CIPHER TECHNIQUE FOR ENHANCING DATA SECURITY

IAEME Publication

IAEME Publications, 2020

View PDFchevron_right

ENHANCING SECURITY OF CAESAR CIPHER USING DIFFERENT

Editor IJRET

View PDFchevron_right

An Improved Caesar Cipher (Icc) Algorithm

Ochoche Abraham

2013

View PDFchevron_right

Enhanced Caesar Cipher algorithm with variable length key and increased cipher complexity

Journal of Computer Science IJCSIS

View PDFchevron_right

Enhancing the Security of Caesar Cipher Substitution Method using a Randomized Approach for more Secure Communication

Atish Jain

International Journal of Computer Applications, 2015

View PDFchevron_right

6 Enhancing the Security of Caesar Cipher Substitution Method using a Randomized Approach for more Secure Communication

Ronak Dedhia

2016

View PDFchevron_right

A New Modified Caesar Cipher Cryptography Method With Legible Ciphertext From A Message To Be Encrypted

Benni Purnama

View PDFchevron_right

Diversified Caesar Cipher for Impeccable Security

priya verma

International Journal of Security and Its Applications, 2017

View PDFchevron_right

Modified Caesar Cipher Using Rectangular Method for Enhanced Security

Himanshu Monga

Journal of Communications Technology, Electronics and Computer Science, 2016

View PDFchevron_right

Enhancement Complexity of Caesar Cipher Algorithm Using Mathematical Computation

Syawash Mirzad

Journal of emerging technologies and innovative research, 2020

View PDFchevron_right

A New Modified Algorithm Based on Caesar Cipher Cryptography for Hindi Vernacular Language

varun sahni

Research Gate, 2022

View PDFchevron_right

SD-AREE: A New Modified Caesar Cipher Cryptographic Method Along with Bit-Manipulation to Exclude Repetition from a Message to be Encrypted

Somdip Dey

2012

View PDFchevron_right

Caesar Cipher Method Design and Implementation Based on Java, C++, and Python Languages

Journal of Computer Science IJCSIS

View PDFchevron_right

An Efficient Implementation for the Cryptanalysis of Caesar’s Cipher

Ibiam A. Agha, Asoronye Gaylord

Melting Pot, 2019

View PDFchevron_right

Cryptographically Use of Caesar Cipher Technique in Password Managing and Security System

Prashant Dey

2015

View PDFchevron_right

Using Letters Frequency Analysis in Caesar Cipher with Double Columnar Transposition Technique.

Ijesrt Journal

International Journal of Engineering Sciences & Research Technology, 2013

View PDFchevron_right

SD-AREE: An Advanced Modified Caesar Cipher Method to Exclude Repetition from a Message

Somdip Dey

2012

View PDFchevron_right

An Extended Hybridization of Vigenere and Caesar Cipher Techniques for Secure Communication

Chahat Khatri

Procedia Computer Science, 2016

View PDFchevron_right

Fragmented Caesar Cipher

Naim Cagman

2016

View PDFchevron_right

Comparison Encryption of How to Work Caesar Cipher, Hill Cipher, Blowfish and Twofish

WASIS HARYONO

2020

View PDFchevron_right

A Modifying of Hill Cipher Algorithm with 3 Substitution Caesar Cipher

Azzam Mujaddid

Proceeding International Conference on Science and Engineering

View PDFchevron_right

Caesar Cipher with Goldbach Code Compression for Efficient Cryptography

Jancarlo Arroyo, WARSE The World Academy of Research in Science and Engineering

International Journal of Advanced Trends in Computer Science and Engineering (IJATCSE), 2020

View PDFchevron_right

Coherent Caesar Cipher for Resource Constrained Devices

priya verma

International Journal of Security and Its Applications, 2016

View PDFchevron_right

Linear Congruential Generator and Caesar Cipher

karuna pandit

International Journal of Engineering and Advanced Technology, 2019

View PDFchevron_right

An Advanced Combined Symmetric Key Cryptographic Method using Bit Manipulation, Bit Reversal, Modified Caesar Cipher(SD-REE), DJSA method, TTJSA method: SJA-I Algorithm

Somdip Dey

2012

View PDFchevron_right

An Integrated Symmetric Key Cryptographic Method – Amalgamation of TTJSA Algorithm, Advanced Caesar Cipher Algorithm, Bit Rotation and Reversal method: SJA Algorithm

Asoke Nath

View PDFchevron_right

Data Encryption by Excluding Repetitive Character in

Ajit Danti

View PDFchevron_right

Three-Pass Protocol Implementation in Caesar Cipher Classic Cryptography

Andysah Putera Utama Siahaan

IOSR Journal of Computer Engineering, 2016

View PDFchevron_right

Three-Pass Protocol Implementation on Caesar Cipher in Classic Cryptography

Andysah Putera Utama Siahaan

View PDFchevron_right

Formulation of an Improved Hybrid Cipher System

Anas Tukur Balarabe

2020

View PDFchevron_right

A Hybrid Caesar-Polybius Cipher with XOR Operation for Enhanced Cryptography

WARSE The World Academy of Research in Science and Engineering

International Journal of Advanced Trends in Computer Science and Engineering, 2020

View PDFchevron_right

Combination of Hill Cipher Algorithm and Caesar Cipher Algorithm for Exam Data Security

Arip Solehudin

Buana Information Technology and Computer Sciences (BIT and CS), 2020

View PDFchevron_right