[1]
P. . Raghavendran and T. . Gunasekar, “Optimizing Cryptographic Security through Innovative Utilization of the K-Transform Algorithm”, GIM, vol. 2, no. 1, pp. 15–27, Jan. 2026, doi: 10.64229/7q0dbc20.