2020
DOI: 10.1080/23799927.2020.1807606
|View full text |Cite
|
Sign up to set email alerts
|

Encrypting and decrypting algorithms using strong face graph of a tree

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 1 publication
0
2
0
Order By: Relevance
“…The cryptography concepts depend on graph labeling techniques. One can find in [6,10] the application of labeled graphs in cryptography. Graph labeling research is becoming popular and interesting nowadays.…”
Section: Introductionmentioning
confidence: 99%
“…The cryptography concepts depend on graph labeling techniques. One can find in [6,10] the application of labeled graphs in cryptography. Graph labeling research is becoming popular and interesting nowadays.…”
Section: Introductionmentioning
confidence: 99%
“…However, this analysis did not extend to security implications. Distinct cryptographic strategies using face anti-magic labelling were unveiled by Kuppan et al [17], while Rao et al [18] advanced a novel image encryption approach through visual cryptography, leveraging the Least Significant Bit (LSB) technique in the spatial domain. In another study, Rama et al [19] augmented the use of CA for DES key generation, primarily benefitting from the randomness induced by CA rule 30, although a limitation was observed in the reduced key size.…”
Section: Introductionmentioning
confidence: 99%