p, li { white-space: pre-wrap; } p, li { white-space: pre-wrap; } This thesis deals with text ciphering. The presented paper describes at first basic theoretical background of cryptology and basic distribution of cryptographic algorithms. Then it describes a brief history of encryption from beginning to present. Theoretical description of ciphering methods and its implementation details are discussed here. All basic types of conventional encryption algorithms and also some modern ciphering methods are included; these are substitution, transposition, steganographic or combinations encryption systems. The result of this thesis is the library of algorithms for text ciphering in Java with a sample application, which demonstrates its funcionalit...
Abstract. The encryption/decryption processes is applied to text. Both algorithms involved the use o...
The following paper presents the possibilities of applying Java language to encrypt e-mail messages....
The paper presents an overview of recent developments in the design of cryptographic algorithms. A s...
This thesis brings an overview of historical and modern methods and approaches used in cryptography....
This thesis is focused on encryption with Java libraries. Goal si to compare the libraries in the al...
Digital communication is becoming an essential part of modern way of life. In some cases it is desir...
The aim of this work is to compare some methods of file encryption. The main goal is to select the m...
This diploma’s thesis discourses the cryptographic systems and ciphers, whose function, usage and pr...
Abstract- In this modern world of communications, cryptography has an important role in the security...
The study of techniques and methods to extract the original text from encrypted texts is called cryp...
The goal of this bachelor thesis is to provide a comprehensive overview of the historical developmen...
Cryptanalysis refers to the study of methods and techniques for obtaining information from encrypted...
Basa Walikan can be used as one of the methods in cryptography because the Basa Walikan character ex...
This thesis deals with new teaching software, which supports asymmetric encryption algorithms based ...
This thesis brings a reader an overview about historical and modern world of cryptographic methods, ...
Abstract. The encryption/decryption processes is applied to text. Both algorithms involved the use o...
The following paper presents the possibilities of applying Java language to encrypt e-mail messages....
The paper presents an overview of recent developments in the design of cryptographic algorithms. A s...
This thesis brings an overview of historical and modern methods and approaches used in cryptography....
This thesis is focused on encryption with Java libraries. Goal si to compare the libraries in the al...
Digital communication is becoming an essential part of modern way of life. In some cases it is desir...
The aim of this work is to compare some methods of file encryption. The main goal is to select the m...
This diploma’s thesis discourses the cryptographic systems and ciphers, whose function, usage and pr...
Abstract- In this modern world of communications, cryptography has an important role in the security...
The study of techniques and methods to extract the original text from encrypted texts is called cryp...
The goal of this bachelor thesis is to provide a comprehensive overview of the historical developmen...
Cryptanalysis refers to the study of methods and techniques for obtaining information from encrypted...
Basa Walikan can be used as one of the methods in cryptography because the Basa Walikan character ex...
This thesis deals with new teaching software, which supports asymmetric encryption algorithms based ...
This thesis brings a reader an overview about historical and modern world of cryptographic methods, ...
Abstract. The encryption/decryption processes is applied to text. Both algorithms involved the use o...
The following paper presents the possibilities of applying Java language to encrypt e-mail messages....
The paper presents an overview of recent developments in the design of cryptographic algorithms. A s...