References for Transposition cipher
Back to article
References to other articles, organized by section
Advanced Encryption Standard
Ciphertext
Cryptography
Permutation
Plaintext
Substitution cipher
General principle
CryptanalysisJigsaw puzzle
Key (cryptography)
Scytale
Ancient GreeksScytale
Route cipher
American Civil WarCode (cryptography)
Rail fence
Columnar transposition
Samuel MorlandDouble transposition
AnagramAnother example
Le Matin (France)Maquis (World War II)
Netherlands in World War II
Office of Strategic Services
Special Operations Executive
VIC cipher
World War I
Disrupted transposition
Rasterschlüssel 44Comb approach
Luigi SaccoDetection and cryptanalysis
1876 presidential election1878–79 United States House of Representatives elections
Anagram
Brute-force attack
Cryptanalysis
Democratic Party (United States)
Edward S. Holden
Frequency distribution
Genetic algorithm
Hill climbing
John R. G. Hassard
Known-plaintext attack
New-York Tribune
Vote buying
Zodiac Killer
Combinations
Substitution cipherFractionation
ADFGVX cipherBifid cipher
Block cipher
Claude E. Shannon
Confusion and diffusion
Morse code
Polybius square
Straddling checkerboard
Trifid cipher
VIC cipher
--
Go to Article
Using English Wikipedia. Change Language?
--
Size: 3.63 KB. 95.95% smaller than original: 89.75 KB 🤮
Fetched: 17 ms. Converted: 367 ms. 🐇
All Wikipedia content is licensed under CC BY-SA 3.0
Response: 20 (Success), text/gemini
| Original URL | gemini://gemi.dev/cgi-bin/wp.cgi/refs?name=Transposition+cipher |
|---|---|
| Status Code | 20 (Success) |
| Content-Type | text/gemini; charset=utf-8; lang=en |