Volume 68 | Issue 3 | Year 2022 | Article Id. IJIJMTT-V68I3P503 | DOI : https://doi.org/10.14445/22315373/IJIJMTT-V68I3P503
In this paper, we established an application of Fourier cosine transformation in exchanging the message in a secured channel via affine cryptosystem which is helpful in digital electronics and signal processing.
[1] A.K. Bhandari, The public key cryptography. Proceedings of the Advanced Instructional Workshop on Algebraic Number Theory HBA (2003) 287-301.
[2] Neil Koblitz, A Course in Number Theory and Cryptography ISBN 3-578071-8 SPIN 10893308.
[3] G.P. Tolstov, Fourier Series, Dover, (1972).
[4] T.W. Korner, Fourier Analysis, Cambridge University Press, (1988).
[5] J.Buchmann, Introduction to Cryptography, Springer verlag (2001).
[6] Alfred J. Menezes, Paul C.Van Oorschot and Scott A.Vanstone,Handbook of Applied Cryptography 1st edition. CRC Press
[7] Ronald newbold bracewell, Fourier transform and its applications, 3rd edition, Mcgraw Hill, (2000).
[8] A.P.Stakhov, The Golden section and Modern Harmony Mathematics, Applications of Fibonacci numbers, kluwer Academic publishers (1998) 393-399
[9] Tom M .Apostol, Introduction to Analytic Number Theory, Spriger-Verlag, Newyork.
[10] Thomas Khoshy, Fibonacci, Lucas and Pell Numbers and Pascal's triangle, Applied Probability Trust, 125-132.
[11] Thomas Khoshy, Fibonacci and Lucas numbers with Applications, John Wiley and Sons,NY,(2001).ISBN: 978-0-471-39939-8.
[12] A. Terras, Fourier Analysis on Finite Groups and Applications, Cambridge University Press, (1999).
[13] Chaya Kumari. D and S. Ashok Kumar, Redei Rational Functions as Permutation Functions and an Algorithm to Compute Redei Rational Functions IJESM , 8(2) (2019).
[14] E.H.Lock Wood, A single-light on pascal's triangle, Math, Gazette, 51(1967) 243-244.
[15] A.Chandra Sekhar, D. Chaya Kumari, S.Ashok Kumar, Symmetric Key Cryptosystem for Multiple Encryptions, International Journal of Mathematics Trends and Technology (IJMTT)., 29(2) (2016) 140-144 . ISSN:2231-5373.
[16] A.Chandra Sekhar, D. Chaya Kumari, Ch.Pragathi, S. Ashok Kumar , Multiple Encryptions of Fibonacci Lucas Transformations, International Organization of Scientific Research (IOST)e-ISSN: 2278-5728,. 12(2) (2016) 66-72.
[17] K.R.Sudha, A. Chandra Sekhar, P.V.G.D, Prasad Reddy, Cryptographic Protection Of Digital Signal Using some Recurrence Relations, IJCNS, (2007) 203-207.
[18] A. Chandra Sekhar, V. Anusha, B. Ravi Kumar and S. Ashok Kumar, Linear independent spanning sets and Linear Transformations for multi-level encryption, 36(4) (2015) 385.
[19] Tianping Zhang and Yuankui Ma, On Generalized Fibonacci Polynomials and Bernouli Numbers Journal of Integer sequence, 8 (2015) 1-6.
[20] A.Chandra Sekhar, D. Chaya Kumari, Ch.Pragathi, S. Ashok Kumar, Multiple Encryption of Independent Ciphers, International Journal of Mathematical Archive (IJMA) , 7(2) (2016) 103-110.
[21] P.A. Kameswari, R.C. Kumari, Cryptosystem with Redei rational functions via pellconics IJCA(0975-8887) , 54(15).
[22] Chaya Kumari. D, Triveni. D and S. Ashok Kumar, Super encryption method of Laplace transformations using Fibonacci numbers. Journal of Hauzhong University of Science and Technology, 50(7).
[23] James L. Massey, The Discrete Fourier Transform in Coding and Cryptography, ITW 1998, San Diego, CA. (2011).
[24] J.M. Ash(ed.), Studies in Mathematical Association of America, (1976).
[25] D Boneh, X Boyen,and H Shacham, Short group Signatures, Annual International Cryptology Conference , (2004).
C. Manjula, Chaya Kumari Divakarla, Kavya B S, "Exchange of Message using Fourier Transforms Via Affine Transformation," International Journal of Mathematics Trends and Technology (IJMTT), vol. 68, no. 3, pp. 12-14, 2022. Crossref, https://doi.org/10.14445/22315373/IJIJMTT-V68I3P503