AES Encryption and A Cryptosystem Obtained with Soft Set II
Abstract
Keywords
References
- [1]. Molodtsov, D., Soft set theory-first results, Computers and Mathematics with Applications, 37, (1999), 19–31.
- [2]. Molodtsov, D. , The Theory of Soft Sets, URRS Puplishers. , Moscow, (in Russian) 2004.
- [3]. Rivest, R. , Adleman, L. and Dertouzos, M., On data banks and privacy homomorphisms, In Foundations of Secure Computation, 169–180. 1978.
- [4]. Roy, A.R. and Maji, P.K., A fuzzy soft set theoretic approach to decision making problem, Journal of Computational and Applied Mathematics , 203, (2007), 412–418.
- [5]. Feng, F. , Jun, Y. B. and Zhao X., Soft semirings, Computers and Mathematics with Applications, 56,( 2008), 2621–2628.
- [6]. Sezgin, A. and Atagün, A.O., On operations of soft sets, Computers and Mathematics with Applications, 61, (2011), 1457–1467.
- [7]. Aktas H., Çagman N., Soft sets and soft groups, Inform. Sci. , 177, (2007),2726-2735.
- [8]. Atagün, A.O. and Sezgin, A., Soft substructures of rings, fields and modules, Comput. Math. Appl., 61 (3), (2011), 592-601.
Details
Primary Language
English
Subjects
-
Journal Section
Research Article
Authors
Emin Aygün
*
0000-0003-3503-0552
Türkiye
Publication Date
March 22, 2019
Submission Date
April 18, 2018
Acceptance Date
December 5, 2018
Published in Issue
Year 2019 Volume: 40 Number: 1
Cited By
Introduction to Soft-Cryptosystem and its Application
Wireless Personal Communications
https://doi.org/10.1007/s11277-022-09635-9Satellite image encryption based on RNA and 7D complex chaotic system
The Visual Computer
https://doi.org/10.1007/s00371-023-03128-xAn advanced encryption system based on soft sets
AIMS Mathematics
https://doi.org/10.3934/math.20241547Near Soft Sets Based Cryptosystem
Turkish Journal of Mathematics and Computer Science
https://doi.org/10.47000/tjmcs.1603280Soft Encryption and Diffie-Hellman Algorithm
Cumhuriyet Science Journal
https://doi.org/10.17776/csj.1627225