International Journal of Soft Computing
Year:
2021
Volume:
16
Issue:
5
Page No.
99 - 106
References
Gupta, D.K., 2012. New concept of symmetric encryption algorithm a hybrid approach of caesar cipher and columnar transposition in multi stages. J. Global Res. Comput. Sci., 3: 60-66.
Mishra, A., 2013. Enhancing security of caesar cipher using different methods. Int. J. Res. Eng. Technol., 2: 327-332.
CrossRef | Direct Link | Polaczyk, B., P. Cholda and A. Jajszczyk, 2013. Peer-to-peer multicasting inspired by Huffman coding. J. Comput. Networks Commun., Vol. 2013, 10.1155/2013/312376
Saroha, V., S. Mor and A. Dagar, 2012. Enhancing security of caesar cipher by double columnar transposition method. Int. J. Adv. Res. Comput. Sci. Software Eng., 2: 86-88.
Sharma, M., 2010. Compression using Huffman coding. Int. J. Comput. Sci. Network Secur., 10: 133-141.
Direct Link | Shrivastava, G., R. Sharma and M. Chouhan, 2013. Using letters frequency analysis in Caesar cipher with double columnar transposition technique. Int. J. Eng. Sci. Res. Technol., 2: 1475-1478.
Singh, R., I. Panchbhaiya, A. Pandey and R.H. Goudar, 2015. Hybrid Encryption Scheme (HES): An approach for transmitting secure data over internet. Procedia Comput. Sci., 48: 51-57.