Optimizing text security with Mahgoub transformation and S-box encryption strategies

S Rasappan, SK Kumaravel, R Murugesan… - International Journal of …, 2024 - Springer
The purpose of this study is to introduce a novel cryptographic method that utilizes the
Mahgoub transformation in conjunction with its inverse transform, along with the S-box …

A cryptographic technique using conformal mapping

KR Mohan, NB Nagaram, R Murugesan… - Recent trends in …, 2023 - taylorfrancis.com
Secret Information sharing is all time requirement in this internet world, especially in
Electronic communications such as system security, smart card, mobile communications etc …

Secret Sharing of Information using First Order ODE and Variable Separable Method

NB Nagaram, KR Mohan, SK Kumaravel… - Recent Trends in …, 2023 - taylorfrancis.com
Secret Information sharing is all time requirement in this internet world. It is widely used in
system security, transaction etc. The mathematical technique is adapted to maintain the …

NOVEL CRYPTOGRAPHIC APPROACH BASED ON PDF AND CDF

RN Devi, KR Mohan… - Southeast Europe Journal …, 2023 - ask2014.ius.edu.ba
Secret Information sharing is all time requirement in this internet world, especially in
Electronic communications such as system security, smart card, mobile communications etc …

A Cryptographic Algorithm using Fuzzy Logic and Deck of Cards

KR Mohan, RN Dev, NB Nagaram… - … Europe Journal of …, 2023 - ask2014.ius.edu.ba
Sharing of information in a secured manner is extremely essential in this world of internet
technology. In recent times, many people come across situations wherein their personal …

A cryptographic technique applying Laplace Transform and Exponetial Function

M Rasool, KR Mohan - Southeast Europe Journal of Soft …, 2023 - inquiry.ius.edu.ba
Secured Information transformation from one person to another is very much essential in this
world of internet. In electronic communications such as system security, smart card, mobile …