Al-Sabaawi, A., 2021, June. Cryptanalysis of Classic
Ciphers: Methods Imple- mentation Survey. In 2021
International Conference on Intelligent Technologies
(CONIT) (pp.1-6). IEEE.
Awadh, Wed & Alasady, Ali & Hashim, Mohammed S..
(2023). A multilayer model to enhance data security in
cloud computing. Indonesian Journal of Electrical
Engineering and Computer Science. 32. 1105.
10.11591/ijeecs. v32.i2. pp1105-1114.
B. Murugadoss, S. N. R. Karna, J. S. Kode and R.
Subramani, “Blind Digital Im- age Watermarking using
Henon Chaotic Map and Elliptic Curve Cryptography
in Discrete Wavelets with Singular Value
Decomposition,” 2021 International Symposium of
Asian Control Association on Intelligent Robotics and
Industrial Automation (IRIA), Goa, India, 2021, pp.
203-208, doi: 10.1109/IRIA53009.2021.9588744.
Bhagat, K., Kumar Das, A., Kumar Agrahari, S., Aanand
Shah, S., RT, D., & Ramasamy, G. (2024). Cross-
Language Comparative Study and Performance
Benchmarking of Sorting Algorithms. Available at
SSRN 5088751.
Carlson, A., Mikkilineni, S.R., Totaro, M.W., Wells, R.B.
and Hiromoto, R.E., 2022, July. Equivalence of Product
Ciphers to Substitution Ciphers and their Se- curity
Implications. In 2022 International Symposium on
Networks, Computers and Communications (ISNCC)
(pp.1-6). IEEE
D. G. Ryandika and W. A. Prabowo, “Two-Stage
Encryption for Strengthening Data Security in Web-
Based Databases: AES-256 and RSA Integration,”
2023 IEEE International Conference on Communicat-
ion, Networks and Satellite (COMNETSAT), Malang,
Indonesia, 2023, pp. 486-492, doi: 10.1109/COMNET-
SAT59769.2023.10420796.
Dhanyashree and K. N. Meera, “An Illustration of L (3, 2,
1)-path Coloring in Cryptography,” 2021 IEEE 3rd
PhD Colloquium on Ethically Driven Innovation and
Technology for Society (PhD EDITS), Bangalore,
India,
2021, pp. 1- 2, doi: 10.1109/PhDEDITS53295.2021.96
49559.
Dhavare, A., Low, R.M. and Stamp, M., 2013. Efficient
cryptanalysis of homo- phonic substitution ciphers.
Cryptologia, 37(3), pp.250-281.
Gurung, A., Gupta, S. and Varshney, S., 2024, April.
Advanced Caesar Cipher Encryption Algorithm Using
Random Key Generation. In 2024 IEEE 9th
International Conference for Convergence in
Technology (I2CT) (pp.1-5). IEEE.
H. S. Chinta, M. A. U. Sai and K. C.R, “A Deep Learning-
Cryptography Hy- brid Approach for Ensuring Medical
Image Confidentiality,” 2024 Third International
Conference on Electrical, Electronics, Information and
Communication Technologies (ICEEICT), Trichirapp
alli, India, 2024, pp. 1-5, doi: 10.1109/ICEE-
ICT61591.2024.10718617.
Ibraheem, N. and Hasan, M., 2020. Combining several
substitution cipher algorithms using circular queue data
structure. Baghdad Science Journal, 17(4), pp.1320-
1320.
J. Long, R. Dantu and J. White, “Performance Analysis of
Homomorphically- Encrypted Heterogeneous Multi-
Layer Graph Databases,” 2023 5th IEEE Inter- national
Conference on Trust, Privacy and Security in Intelligent
Systems and Applications (TPS-ISA), Atlanta, GA,
USA, 2023, pp. 324-334, doi: 10.1109/TPS-
ISA58951.2023.00047.
Kisan Daule, Viraj, Sanay Santh V, Keshav Padmakumar,
Gayathri Mohandas, and Gayathri Ramasamy.
"Optimized System for Crowd Management Using
Encryption and Decryption Techniques." Available at
SSRN 5089076 (2024).
M. S. Rao, K. Venkata Rao and M. H. M. Krishna Prasad,
“Hybrid Security Approach for Database Security using
Diffusion based cryptography and Diffie-Hellman key
exchange Algorithm,” 2021 Fifth International
Conference on I-SMAC (IoT in Social, Mobile,
Analytics and Cloud) (I-SMAC), Palladam, India,
2021,
pp. 1608- 1612, doi: 10.1109/I- SMAC52330.2021.96
40762.
M. Saraswathi and K. N. Meera, “Radio mean labeled paths
in Cryptography,” 2022 IEEE 4th PhD Colloquium on
Emerging Domain Innovation and Technology for
Society (PhD EDITS), Bangalore, India, 2022, pp. 1-2,
doi: 10.1109/PhDED- ITS56681.2022.9955298.
Majumder, R., Datta, S. and Roy, M., 2022, March. An
enhanced cryptosys- tem based on modified classical
ciphers. In 2022 8th International Conference on
Advanced Computing and Communication Systems
(ICACCS) (Vol. 1, pp.692- 696). IEEE.
Mamro, O., Lagun, A. and Dupak, B., 2021, May.
Investigation of Homophonic En- cryption on Zodiac
Z408 and Z340 Ciphers. In 2021 IEEE 12th
International Con- ference on Electronics and
Information Technologies (ELIT) (pp.109-112). IEEE.
Mandapati and Sankar, Divity Mani and Sri Hanish Kumar,
Meka Sai and Ramasamy, Gayathri, Intelligent
Innovations in Personal Security: A Smarter Approach
for Enhanced Protection (November 15, 2024).
Manjunatha, S. and Thenmozhi, S., 2024, May. Extended
Pigpen Cipher with New Variations using ASCII and
Division Substitution. In 2024 4th International
Conference on Pervasive Computing and Social
Networking (ICPCSN) (pp.785- 789). IEEE.
Naga Sudha, D. K. S., Hari Priya, C., Bindu Sree, M.,
Sankar, D. M., Sri Hanish Kumar, M. S., & Ramasamy,
G. (2024). Intelligent Innovations in Personal Security:
A Smarter Approach for Enhanced Protection.
S. Radhakrishnan and A. Akila, “Securing Distributed
Database Using Elongated RSA Algorithm,” 2021 7th
International Conference on Advanced Computing and
Communication Systems (ICACCS), Coimbatore,
India,
2021, pp. 1931- 1936, doi: 10.1109/ICACCS51430.20
21.9441962.
S. F. Raza, S. Deshmukh, A. Kulkarni and D. Pradhan,
“Face Database Protection Using Encryption