Volume 65 | Issue 2 | Year 2019 | Article Id. IJMTT-V65I2P503 | DOI : https://doi.org/10.14445/22315373/IJMTT-V65I2P503
CH. Jayanthi, V.Srinivas, "Mathematical Modelling for Cryptography using Laplace Transform," International Journal of Mathematics Trends and Technology (IJMTT), vol. 65, no. 2, pp. 10-15, 2019. Crossref, https://doi.org/10.14445/22315373/IJMTT-V65I2P503
[1] Alexander Stanoyevitch, Introduction to cryptography with mathematical foundations and computer implementations, CRC Press, (2002).
[2] Barr T.H., Invitation to Cryptography, Prentice Hall, 2002.
[3] Blakley G.R., Twenty years of Cryptography in the open literature, Security and Privacy, Proceedings of the IEEE Symposium, May 1999, 9 -12.
[4] Eric C., Ronald K . and James W.C., Network Security Bible, Second edn., Wiley India pub., 2009.
[5] Erwin Kreyszing, Advanced Engineering Mathematics, John Wiley and Sons Inc., 1999.
[6] G.Naga Lakshmi, Ravi Kumar B. and Chandra Sekhar A., A cryptographic scheme of Laplace transforms, International Journal of Mathematical Archive-2, 2011, 2515-2519.
[7] Grewal B.S., Higher Engineering Mathematics, Khanna Pub., Delhi, 2005.
[8] Hiwarekar A.P., A new method of cryptography using Laplace transform of hyperbolic functions, International Journal of Mathematical Archive- 4(2), 2013, 208-213.
[9] Hiwarekar A.P., Application of Laplace Transform for Cryptographic Scheme, proceeding of World Congress on Engineering Vol.II, LNCS, 2013, 95-100.
[10] Johannes A. Buchmann, Introduction to Cryptography, Fourth Edn., Indian Reprint, Springer, 2009.
[11] Overbey J., Traves W. and Wojdylo J., On the Key space of the Hill Cipher, Cryptologia, 29(1), January 2005, 59-72.
[12] Saeednia S., How to Make the Hill Cipher Secure, Cryptologia, 24(4), October 2000, 353-360.
[13] Stallings W., Cryptography and network security, 4th edition, Prentice Hall, 2005.
[14] Stallings W., Network security essentials: Applications and standards, first edition, Pearson Education, Asia, 2001.
[15] Sukalyan Som and Moumita Som., Article: DNA Secret Writing with Laplace Transform, International Journal of Computer Applications, July 2012, 50(5):44-50.
[16] Swati Dhingra, Archana A. Savalgi and Swati Jain, Laplace Transformation based Cryptographic Technique in Network Security, International Journal of Computer Applications, Volume 136, No.7, February 2016, 0975-8887.