Thanks to the cryptosystem, confidential information can be transmitted securely. When we perform this encryption using matrices obtained from near soft sets, we increase our security even more. Accordingly, the equivalence relation used in this set will change according to the characteristics of the set that are restricted and the resulting encrypted word will change accordingly.
| Primary Language | English |
|---|---|
| Subjects | Cryptography |
| Journal Section | Research Article |
| Authors | |
| Submission Date | December 17, 2024 |
| Acceptance Date | December 12, 2025 |
| Publication Date | February 23, 2026 |
| DOI | https://doi.org/10.47000/tjmcs.1603280 |
| IZ | https://izlik.org/JA69KL75KU |
| Published in Issue | Year 2026 Volume: 18 Issue: 1 |