A novel approach to information security using four dimensional (4d) playfair cipher fused with linear feedback shift register K Bhat, D Mahto, DK Yadav Indian Journal of Computer Science and Engineering 8 (1), 15-32, 2017 | 15 | 2017 |
A novel scheme for lossless authenticated multiple secret images sharing using polynomials and extended visual cryptography K Bhat, UK Reddy KR, R Kumar HS, D Mahto IET Information Security 15 (1), 13-22, 2021 | 12 | 2021 |
Information Security using Adaptive Multidimensional Playfair Cipher. K Bhat, D Mahto, DK Yadav International Journal of Advanced Research in Computer Science 8 (5), 2017 | 7 | 2017 |
Comparison analysis of AES-256, RSA-2048 and four dimensional playfair cipher fused with linear feedback shift register K Bhat, D Mahto, DK Yadav International Journal of Advanced Research in Computer Science 8 (3), 420-422, 2017 | 7 | 2017 |
Vantages of adaptive multidimensional playfair cipher over AES-256 and RSA-2048 K Bhat, D Mahto, DK Yadav International Journal of Advanced Research in Computer Science 8 (5), 498-500, 2017 | 6 | 2017 |
Generalization for multidimensional playfair cipher K Bhat, D Mahto, DK Yadav International Journal of Advanced Research in Computer Science 8 (3), 379-381, 2017 | 4 | 2017 |
Image Security Using Hyperchaos and Multidimensional Playfair Cipher K Bhat, D Mahto, DK Yadav, C Azad Security and Privacy: Select Proceedings of ICSP 2020, 93-106, 2021 | 2 | 2021 |
Security analysis of visual based share authentication and algorithms for invalid shares generation in malicious model K Bhat, D Jinwala, Y Prasad, M Zaveri Proceedings of the 2023 5th International Conference on Image Processing and …, 2023 | 1 | 2023 |
A Verifiable Lossless Multiple Secret Images Sharing Scheme K Bhat International Conference on Information Systems Security, 157-172, 2021 | 1 | 2021 |
Securing images using chaos and multidimensional Playfair cipher K Bhat, D Mahto 2020 4th International Conference on Electronics, Communication and …, 2020 | | 2020 |
SISS‐CSA: Secret image sharing scheme with ciphertext‐based share authentication for malicious model K Bhat, DC Jinwala, Y Prasad, MA Zaveri Software: Practice and Experience, 0 | | |