News

In this paper, the authors used the stream cipher which is the best way with the algorithm Geffe generator with a specific length to encryption the information from plain text in the first compute.
Carefully, using these modulus & remainder for ... In this paper, the authors provide with an encryption decryption algorithm with secure strength, bringing failure to the intruder effort to ...
This algorithm ... image undergoes a bitwise XOR operation with the quantum key image to complete the encryption process. Preparation of Quantum Key Map: The quantum key map is prepared using ...