A Gautam, GS Gaba, R Miglani… - Indian Journal …, 2015 - sciresol.s3.us-east-2.amazonaws …
In cryptography, the security of any algorithm relies on the strength of the key used and
nonlinear mapping of the original information or data. It is desirable to have resistance …