Optimizing text security with Mahgoub transformation and S-box encryption strategies

S Rasappan, SK Kumaravel, R Murugesan… - International Journal of …, 2024 - Springer
The purpose of this study is to introduce a novel cryptographic method that utilizes the
Mahgoub transformation in conjunction with its inverse transform, along with the S-box …

Enhancing security with Aboodh transformation and S-box fusion in image encryption

S Rasappan, R Murugesan, SK Kumaravel… - International Journal of …, 2024 - Springer
The aim of this research is to create a novel cryptographic technique by incorporating
Aboodh and its inverse transform into the S-Box method. The evaluation outcomes suggest …

NOVEL CRYPTOGRAPHIC APPROACH BASED ON PDF AND CDF

RN Devi, KR Mohan… - Southeast Europe Journal …, 2023 - ask2014.ius.edu.ba
Secret Information sharing is all time requirement in this internet world, especially in
Electronic communications such as system security, smart card, mobile communications etc …

A Cryptographic Algorithm using Fuzzy Logic and Deck of Cards

KR Mohan, RN Dev, NB Nagaram… - … Europe Journal of …, 2023 - ask2014.ius.edu.ba
Sharing of information in a secured manner is extremely essential in this world of internet
technology. In recent times, many people come across situations wherein their personal …

A cryptographic technique applying Laplace Transform and Exponetial Function

M Rasool, KR Mohan - Southeast Europe Journal of Soft …, 2023 - inquiry.ius.edu.ba
Secured Information transformation from one person to another is very much essential in this
world of internet. In electronic communications such as system security, smart card, mobile …