![]() updated 3 months ago |
Steganography using LSB substitution The term steganography means “cover writing” |
0 Comments 63 Downloads (30 Days) |
![]() updated 6 months ago |
Distributed Storage based on Secret Sharing Schemes (D4S) Distributed Storage based on Secret Sharing Schemes |
0 Comments 8 Downloads (30 Days) |
![]() updated 9 months ago |
Implementation of RSA Algorithm RSA is an algorithm for public-key cryptography. |
1 Comment 56 Downloads (30 Days) |
![]() updated 9 months ago |
Data Encryption Standard (DES) The last generation of encryption standard, good for cryptography study and cipher design. |
1 Comment 61 Downloads (30 Days) |
![]() updated 1 year ago |
Algorithmic pseudo-random permutations for large sequences permdata = createRandomPermutation(numobjects, nrounds) create a pseudo-random permutation |
0 Comments 13 Downloads (30 Days) |
![]() updated 1 year ago |
Converting into character from decimal Works as to reproduce character values from ASCII values |
1 Comment 4 Downloads (30 Days) |
![]() updated 1 year ago |
Creating a stream of binary values It is actually a long matrix having one row & several number of columns. |
0 Comments 4 Downloads (30 Days) |
![]() updated 1 year ago |
Converting Binary strean into its decimal values It converts binary stream into its decimal value taking 8 bits at a time although you can change it. |
1 Comment 5 Downloads (30 Days) |
![]() updated 1 year ago |
append upto the multiple of 48 It calculates the length of the binary array & makes it multiple of 48 by adding sting of 0 |
0 Comments 2 Downloads (30 Days) |
![]() updated 1 year ago |
Onetimepad encryption under the category og substitution cipher |
0 Comments 7 Downloads (30 Days) |
![]() updated 2 years ago |
Generation of two-out-of-two Visual Cryptography Scheme shares. |
8 Comments 37 Downloads (30 Days) |
![]() updated 2 years ago |
Substitution Cipher encoder and decoder A simple pair of functions to encode messages and decode them by means of frequency analysis. |
0 Comments 12 Downloads (30 Days) |
![]() updated 2 years ago |
Transposition encryption technique This program helps you to encrypt any text file using transposition encryption technique |
0 Comments 22 Downloads (30 Days) |
![]() updated 2 years ago |
This is Program for Caesar Cipher encryption Technique. |
5 Comments 18 Downloads (30 Days) |
![]() updated 2 years ago |
Improved Base Expansion Algorithm This is an improvement of my last base expansion algorithm |
0 Comments 6 Downloads (30 Days) |
![]() updated 2 years ago |
encrypt your voice using OTP algorithm |
1 Comment 17 Downloads (30 Days) |
![]() updated 2 years ago |
Example code for "Deploying Shared Libraries" posting in the "Art of MATLAB" blog. |
1 Comment 41 Downloads (30 Days) |
![]() updated 5 years ago |
Finds the modular inverse over finite (Galois) field. |
0 Comments 15 Downloads (30 Days) |
![]() updated 8 years ago |
bent function for test s-box. |
3 Comments 8 Downloads (30 Days) |
![]() updated almost 11 years ago |
A couple of simple cryptography techniques. |
2 Comments 14 Downloads (30 Days) |