g-EoN: A Non-salient Approach Towards Encryption Using Gamma Function Γ (-α β)=-β α Γ (β-α β)

AK Das, N Kar - International Conference on Advances in Cyber …, 2021 - Springer
Cryptography is the art of presenting secret information under code obfuscation. This can be
achieved by various algorithms which convert human readable text into non-legible text …

An enhanced cipher technique using vigenere and modified caesar cipher

D Gautam, C Agrawal, P Sharma… - … on Trends in …, 2018 - ieeexplore.ieee.org
Cryptography is one amongst the foremost fields of study lately because it is critical to keep
up the confidentiality of the info that is distributed over the network. There are a unit …

[PDF][PDF] Integrating Classical Encryption with Modern Technique

F Saeed, M Rashid - IJCSNS International Journal of Computer, 2010 - Citeseer
Alphabetical ciphers are being used since centuries for inducing confusion in messages, but
there are some drawbacks that are associated with Classical alphabetic techniques like …

[PDF][PDF] Extended vigenère using double transposition cipher with one time pad cipher

A Priyam - Intl J Engg Sci Adv Research, 2015 - ramauniversityjournal.com
Cryptography is a technique which converts any intelligible message into unintelligible
message; it is used for secure communication between any two parties in any insecure …

A cryptography model using hybrid encryption and decryption techniques

M Suklabaidya, A Das, B Das - International Journal of …, 2018 - papers.ssrn.com
In the present era of technology, data communications become a part and parcel of our day-
to-day life. But during communications many unwanted things can happen and as a result …

[PDF][PDF] Vigenere cipher algorithm with grayscale image key generator for secure text file

I Saputra, NA Hasibuan, R Rahim - International Journal of …, 2017 - researchgate.net
With the changing of the times, information is crucial today especially for technological
developments, especially in data security systems. In maintaining data security, there is a …

A new algorithm combining substitution & transposition cipher techniques for secure communication

U Bhargava, A Sharma, R Chawla… - … Conference on Trends …, 2017 - ieeexplore.ieee.org
In today's world of communication, the maintenance of the security, confidentiality and
integrity of the data is a big challenge. Cryptography is the technique that contributes to …

[PDF][PDF] Modified caesar cipher for better security enhancement

K Goyal, S Kinger - International Journal of Computer Applications, 2013 - Citeseer
Encryption is the process of scrambling a message so that only the intended recipient can
read it. With the fast progression of digital data exchange in electronic way, Information …

[PDF][PDF] Cryptology and information security-past, present, and future role in society

S Bhattacharya - … Journal on Cryptography and Information Security …, 2019 - academia.edu
This article provides a general introduction to the subject of Cryptology, Crytography and
Crytoanalysis and explains the terminology and the practical application of security …

[PDF][PDF] Enhancing the security of Caesar cipher using double substitution method

SB Dar - International Journal of Computer Science & …, 2014 - ijcset.com
Cryptography comes from the Greek words for “secret writing”. The plain text is encrypted
into the corresponding cipher text, using an algorithm and a key. Substitution and …