Click here to Skip to main content
11,479,096 members (62,079 online)
Click here to Skip to main content
Add your own
alternative version

Classical Encryption Techniques

, 1 Mar 2013 CPOL 108.4K 7.6K 172
Implementation of famous Ciphering algorithms



Compare Revision Minor Date Status Editor
9 - publicly available No 1-Mar-13 10:33 Available Smitha Vijayan
Updates in content. 79 changes had been made.
8 No 1-Dec-12 5:35 Available Omar Gameel Salem
Updates in content. 6460 changes had been made.
7 No 10-Aug-12 14:37 Available Omar Gameel Salem
Updates in content. 23 changes had been made.
6 No 19-Jun-12 9:21 Available Omar Gameel Salem
Updates in content. 12 changes had been made.
5 No 5-Mar-10 12:00 Available Omar Gameel Salem
4 No 5-Mar-10 11:55 Composing Omar Gameel Salem
3 No 5-Mar-10 11:48 Composing Omar Gameel Salem
2 No 5-Mar-10 11:35 Composing Omar Gameel Salem
1 No 5-Mar-10 7:11 Composing Omar Gameel Salem


This article, along with any associated source code and files, is licensed under The Code Project Open License (CPOL)


About the Author

Omar Gameel Salem
Software Developer
Australia Australia
Enthusiastic programmer/researcher, passionate to learn new technologies, interested in problem solving, data structures, algorithms, AI, machine learning and nlp.

Amateur guitarist/ keyboardist, squash player.

If you have a question\suggestion about one of my articles, or you want an algorithm implemented in C#, feel free to contact me.
Follow on   LinkedIn

| Advertise | Privacy | Terms of Use | Mobile
Web03 | 2.8.150520.1 | Last Updated 1 Mar 2013
Article Copyright 2010 by Omar Gameel Salem
Everything else Copyright © CodeProject, 1999-2015
Layout: fixed | fluid