Open Access
ARTICLE
Secure Text Mail Encryption with Generative Adversarial Networks
1 Constructor University, Bremen gGmbH, Campus Ring 1, Bremen, 28759, Germany
2IU Internationale Hochschule, Juri-Gagarin-Ring 152, Erfurt, D-99084, Germany
* Corresponding Author: Alexej Schelle. Email:
Journal of Information Hiding and Privacy Protection 2025, 7, 33-44. https://doi.org/10.32604/jihpp.2025.067510
Received 06 May 2025; Accepted 07 July 2025; Issue published 31 July 2025
Abstract
This work presents an encryption model based on Generative Adversarial Networks (GANs). Encryption of RTF-8 data is realized by dynamically generating decimal numbers that lead to the encryption and decryption of alphabetic strings in integer representation by simple addition rules, the modulus of the dimension of the considered alphabet. The binary numbers for the private dynamic keys correspond to the binary numbers of public reference keys, as defined by a specific GAN configuration. For reversible encryption with a bijective mapping between dynamic and reference keys, as defined by the GAN encryptor, secure text encryption can be achieved by transferring a GAN-encrypted public key along with the encrypted text from a sender to a receiver. Using the technique described above, secure text mail transfer can be realized through component-wise encryption and decryption of text mail strings, with total key sizes of up to bits that define random decimal numbers generated by the GAN. From the present model, we assert that encrypted texts can be transmitted more efficiently and securely than with RSA encryption, given an additional security component that users of the specific configuration of the GAN encryption model are unaware of the GAN encryptor circuit and configuration, respectively.Keywords
Modern hybrid models for secure text mail encryption are based on the connection of symmetric and asymmetric encryption techniques using algorithms such as the Rivest-Shamir-Adleman encryption algorithm (RSA) to send encrypted keys from a sender to a receiver [1]. Those methods usually rely on the definition of one public and one private key for secure key exchange, which a network may use to encrypt and decrypt a certain alphanumeric text mail structure [2]. Hybrid models do have the advantage of secure key transfer at the cost of lower computational efficiency; however, the generation of the key may be unsecured due to a lack of internal security. Additionally, the components of the secured key are encrypted with the same single key.
To examine hybrid encryption models and their vulnerabilities, including the efficiency trade-offs between symmetric and asymmetric encryption techniques, the concept of Generative Adversarial Networks (GAN) proves to be a well-suited technique to model data that approximates the original data or data objects from the generation and comparison of the data objects modeled by the GAN with the original object [3]. A large range of applications has been developed with GANs in information sciences, such as sound or color recognition [4,5], or more complex classification algorithms that serve to classify data structures and, in general, the elements of information theory [6–8].
Very fundamentally, Generative Adversarial Networks build an important component to understanding the functionality of biological and physical processes of neuronal networks. In the framework of basic field theories for the modeling of information processing, the very basic mechanisms of learning as described by simple mathematical models such as the single-layer perceptron (SLP) work equivalently to the stepwise convergence of a GAN that finds configurations of information compatible with already known or consistent results [9,10]. While technologies based on GANs have been developed quite extensively for applications in the context of artificial intelligence, fewer efforts have been made to enhance information security and data encryption techniques [11].
As a natural type of use, GANs can be applied to find random configurations of binary numbers that vary with the internal modeling parameters of the artificial network. In standard types of applications, the principal structure of a GAN is composed of a generator that models certain configurations of data structures and objects, respectively, which is connected to a differentiator that compares the generated data structures to pre-defined reference objects. In this configuration, a GAN primarily builds an artificial learning method that belongs to the class of supervised learning algorithms.
In the present work, we show how to avoid these weak points with key encryption models based on GANs that do not rely on factorization on the one hand. Developing an encrypting technique that defines different components (decimal numbers) for the encryption of the key itself, with a circuit encryptor configuration that is hidden from the users of the secure key, additionally enhances the security of the encryption technique. Applying this GAN-based secure text mail encryption algorithm, we find that up to 24-bit encryption corresponding to total key sizes of up to
Encryption of RTF-8 (text) data is realized by dynamically generating private decimal numbers that lead to the encryption and decryption of alphabetic strings in integer representation by simple addition rules, the modulus of the dimension of the considered alphabet [12,13]. Random decimal values for the encryption of alphabetic components for email strings are calculated by the randomization of binary numbers with definite dimensions N that generate decimal values with a random number generator in Python. The binary numbers for the private dynamical keys correlate with the binary numbers of public reference keys from a mapping defined by the specific GAN implementation. For reversible encryption with bijective mapping between dynamic and reference keys as defined by the GAN, the encoded text mail is transferred from a sender to a receiver together with the reference keys that build the basis for modeling decimal numbers from configurations of random binary keys. Using the technique described, secure text mail transfer can be realized by component-wise encrypting text mail strings with random decimal numbers obtained from the GAN.
The present GAN encryption model builds a new and innovative technique for text mail encryption that enables secure password and text string encryption with security levels that scale exponentially with the total key size, while the time for generating (partial) private keys for encrpytion scales only linearly with the number of bits used for calculating binary keys from specific random GAN configurations. From securing specific model configurations from the sender and receiver, security can be enhanced by excluding certain risks from internal security issues relating to the sender and the receiver.
Our encryption technology is built on two different components—the discriminator and the generator that exchange information in terms of N-bit binary number codes. From the standard definition of GANs, we formally simplify our system parameters from setting all weighting coefficients of the two interacting (SLP) neuronal networks to the binary basis [14]. Each component of the GAN thus defines a decimal number from the N-bit signal, which in particular enables the definition of a complex number from the sum
where

Figure 1: (Color online) The conceptual setup of the Generative Adversarial Network (GAN) is shown in the figure above. The generating part of the technology builds dynamic N-bit-sized key values G that are processed with the circuit of the GAN. From that configuration, reference keys R are obtained at the discriminator of the GAN. The transmitted reference keys are secure against hacking since the circuit technology is generated randomly and, in particular, hidden from external observers. After receiving the (dynamically) encrypted text message with the reference keys, transmitted text structures such as emails or passwords can be decrypted with the recalled dynamical keys obtained intrinsically from the submitted reference keys by applying the GAN circuit technology

Figure 2: (Color online) The GAN encryption model is illustrated in the figure above. A sender provides the text message of length M that is sent from the sender to the GAN, which encrypts the message with an (exemplary) randomly generated configuration of a total number of logical NOT gates. The logical NOT gates connect the N-bits of a dynamical key at the generator with the N-bits of the reference keys at the discriminator of the neuronal network that tests the total configuration for deviation until the checksum of the deviation equals zero. The encrypted message, together with the M reference keys (that build a total key size of M × N bits) are sent to the receiver, which itself decrypts the message with M dynamical keys obtained from applying the GAN to generate them from the reference keys for decryption. From simply pishing the encrypted text and the reference keys, an external observer isn’t able to decrypt the message within polynomial time since the number of possible keys scales exponentially with
Different circuit layers that are reversible concerning the mathematical transformation of the associated N-bit system can be configured for textual decryption. An important formal aspect is the circuit’s reversibility, which is expressed by bijective mathematical mappings that describe the interaction of the generator with the discriminator of the GAN. Circuits can be built by connecting the standard logical NOT gate for reversible transformations and the logical gates AND, OR, NOR, and XOR, which leads to irreversible circuits for the generation of complex numbers (decimal number pairs) for the encryption and decryption of text structures [15]. Ensuring reversibility means that the GAN technology enables unique encryption and decryption of an associated RTF-8 text (compare Table 1).

Similar to the RSA algorithm, we assume one public and one private key, where the public key is transferred from a sender to a receiver, and the private key is used to encrypt and decrypt the text message. Instead of encrypting the text message or a transferred key with the (decrypted) combination of public and private keys (RSA), relying in particular on costly computation power, the security of the GAN approach makes use of the following technique. Relevant text messages are connected to a GAN encryptor that entails a total number of M reference keys (public keys) and M dynamical keys (private keys) of size N-bit, i.e., total key size of M × N bits, where M is the number of letters in the text. Each text message letter is encrypted and decrypted using a single character of the M-bit dynamic N-bit keys for encryption and decryption, respectively. Encryption and decryption are performed by mapping the relevant characters
for encryption and
for decryption, where
given a certain configuration C of the circuit technology, with K the number of characters of the considered alphabet. The function f: {a,
The GAN encryption model enables secure text mail transfer by allowing the sender to access only the reference keys and the clear and encrypted text for submission to a receiver. Encrypted text structures sent to the receiver are decrypted by connecting the reference keys with the GAN to generate the (same) dynamical key structure to decrypt the transferred text message. Thereby, the encryptor configuration is unknown to the users of the GAN (sender and receiver), while the current configuration of the random circuit is (assumed to be) hidden from all external parties. Compared to algorithms like RSA, besides a typically larger key size that is encrypted with the GAN encryptor, security is further enhanced by sending (a) decrypted reference key(s) on the one hand. The GAN setup itself allows the decryption of a text message only by decrypting the reference keys with the GAN encryptor that is hidden from the external observer. Ideally, the security setup can be extended by securing the GAN encryptor from the sender and the receiver, e.g., building simple password protection for the Python source code, making the encryption model secure against internal information leaks. Thus, an external observer cannot decrypt a text message by passing the password-protected key generation framework implemented in the Python programming language, since the current circuit configuration is still unknown. Passwords can be chosen to any complexity, and access to the system generating source code can be tracked, such as to change the encryptor configuration after access or after a certain period, with possibly several attempts to access the key-generating Python framework.
We have tested the algorithm against scaling as shown in Fig. 3 and find that M times 8-bit to 24-bit key encryption and decryption corresponding to a total key size of up to

Figure 3: (Color online) Shown is the scaling of computation time as a function of the number of bits (partial key sizes, i.e., one key per character of the encrypted message) used to reversibly (upper figure) and irreversibly (lower figure) encrypt standard passwords of length 25 characters (circles), small email text structures (squares) and one-page literature texts (triangles)—for connections realized by random configurations of NOT and AND logical gates integrated into the GAN encryptor (AND logical gate shows the same scaling behavior, not shown explicitly)
The following pseudocode describes the process flow of the GAN encryption model for encryption and decryption modes, respectively.
START THE ALGORITHMIC FLOW
SET KEY LENGTH (TOTAL LENGTH IS SUM OF LENGTH)
FUNCTION THAT MAPS LETTERS TO UNIQUE INTEGER NUMBERS
FUNCTION THAT MAPS VALUES TO UNIQUE LETTERS
FUNCTION THAT GENERATES BINARY KEYS
FUNCTION THAT DISTINGUISHES BINARY KEYS OF N-BIT SIZE
FUNCTIONS THAT ENTAIL CIRCUITS IN SEQUENTIAL LOGICS
GAN FUNCTION
WHILE TRUE
APPLY CIRCUIT FUNCTION
IF FIRST ITERATION
GENERATE INITIAL KEY VALUES
ELSE
GENERATE GAN KEY
COMPUTE DISCRIMINATOR
IF MATCHES PREDEFINED ACCURACY
RETURN CURRENT KEY
RANDOMLY GENERATE BINARY KEYS
READ INPUT TEXT (FOR ENCRYPTION/DECRYPTION)
INITIALIZE RANDOM KEYS
ITERATE OVER EACH CHARACTER IN THE INPUT STRING
FOR EACH LETTER
GENERATE INITIAL KEY
GENERATE REFERENCE KEY
STORE REFERENCE KEY
SET REFERENCE KEY = INITIAL KEY
GENERATE ENCRYPTION/DECRYPTION KEY WITH GAN
CONVERT LETTER TO DECIMAL VALUE (ENCRYPTION)
GENERATE DECIMAL VALUE FROM BINARY ENCRYPTION KEY
DECIMAL VALUE TO LETTER
ENCRYPT/DECRYPT DECIMAL (LETTER) VALUE
CONVERT DECIMAL VALUE TO LETTER (DECRYPTION)
WRITE TO FILE
END
The main applicational scope of the present encryption algorithm is the secure text transfer from a sender to a receiver using the GAN encryptor as described in the previous Section 2. Extensions for further applications, like irreversible text deletion or password generation, have been developed from the primary GAN encryption model, which has been tested to work successfully. Quantifying the computational performance of the routines in this applicational framework relies on testing different runtime variables as a function of the number of bits used to define the relevant decryption keys. For secure text mail encryption, scaling of computation time in terms of key complexity shows that a critical value of around a few hours of computation time is observed at component-wise key sizes of around 36 bits. Instead of gaining security from large component-wise key sizes used for encryption, it is the size of the total key that defines a secure framework for information security.
Protecting information in the present security model further originates from protecting the randomly and automatically generated GAN encryptor from all parties involved in the text transfer process, i.e., a sender, a receiver, as well as a potential external hacker. This is achieved by allowing access to the Python source code only for external third parties (to which current configurations of the randomly generated logical GAN circuit are unknown) rather than the actual users of the software, and by automating the generation of the encryptor. Although it is not necessary to secure information about the GAN configuration from the sender and the receiver for the GAN encryption model’s security, it reduces the risk of internal information leaking.
The structure of a GAN is built of a generator and a discriminator that build an interacting system exchanging information as described above. While the generating part tries to model N-bit-wise dynamical keys that fit a certain set of randomly created reference keys stored in the discriminator part of the GAN, a circuit that is configured between the two components ensures non-symmetric key structures between dynamic and reference keys. Dynamic keys, which are pairwise connected to reference keys by the GAN encryptor, are used to encrypt and decrypt the relevant text in RTF-8 format.
In the present setup, we have defined logical operators mainly from combinations of NOT gates that ensure reversible transfer of N-bit logical signals as described by bijective functions defined on binary logical sets. Convergence is achieved by generating dynamic keys that match the reference keys at the discriminator after passing the logical circuit exactly, relating a pair of dynamic and reference keys in each convergent step of a multiple of several subsequent GAN iteration cycles. For a text string of a total of M letters and signs, equally many reference keys are generated within a few seconds to minutes in an N-bit GAN generator with typically N = 18–24 bits serving for information transfer between the sender and the receiver of an encrypted message. As realized in our case study, we have transferred the encrypted texts, such as passwords, by standard email from different senders to receivers, together with the reference keys for decryption over a wide distance of several thousand kilometers. Text decryption was possible within seconds to minutes using the decryption of encrypted text messages using the decryption mode of the GAN for the reference keys. An artificial memory intelligence has been built in the generator part of the GAN that was able to reduce the number of iteration steps for convergence, but not the computation time, to accelerate the approach of a zero-sum state (between the generator and the discriminator).
Mapping of characters to decimal number format from a function f has been realized for text and numbers in RTF-8 format with dynamic keys of size N-bit (with values of N up to N = 32). From an N-bit key structure, decimal numbers in the range of 0 to
Finally, we have applied the GAN encryption model to perform non-reversible text deletion [17]. This mode of operation can be realized by implementing non-reversible circuit logic with the logical AND, OR, NOR, and XOR gates that are connected between the generator and the discriminator in the GAN encryptor. Since the forward direction (encryption) of this mode of operation generates an ideally disjoint set of reference keys, encryption of a text string results in an irreversible mapping after the dynamic keys are overwritten by the encrypted keys—since, indeed in such case, the set of dynamic keys cannot be remodeled from the remaining set of (non-bijectively relating) reference keys in the backward direction (decryption).
The GAN encryption algorithm works stably against error generation. Potential vulnerabilities are external attacks against the GAN configuration, or key generation errors caused by unstable chip technologies on the personal computer, or the runtime environment. Hacking of the corresponding text files that save the GAN encryptor configuration in bitwise format leads to failure of the GAN algorithm. Since decimal numbers are generated from mapping random N-bit configurations to decimal numbers from a standard number type transformation, decrypting text strings and messages from differently (wrongly) generated decimal numbers from wrong configurations of the GAN decryptor leads to errors in the final text string. Key generation errors from intrinsic failure mechanisms do build a source of error mechanisms, however, with only very low impact. Because errors may mainly only be generated from wrong chip configurations on a personal computer, or from wrong configurations of the runtime environment, not from the GAN algorithm, the percentage of this error mechanism is rather vanishingly small. Hence, as long as the GAN encryptor model works in the correct reversible mode, bijective mapping ensures errorless encryption and decryption of the GAN algorithm.
In the present approach, the concept of Generative Adversarial Networks applies to generate dynamic keys of a large total size for encryption. Text messages that can be read and mapped to numeric values from a standard text file are decrypted by calculating and modifying random decimal numbers with a random number generator that entails a circuit as an encryption technology. The decrypted text message and the set of M binary keys are sent from the sender to the receiver, enabling the decryption of the encrypted message with the receiver’s part. The sender and the receiver, as much as an external hacker using the encryption software or phishing the encrypted text with large-size reference keys attached, respectively, are unable to access the Python script, to which access is encrypted with a strong password, making the encryption model twofold secure against external hacking.
Reversible encryption can be applied for email text exchange, secure password transfer, or valid key generation. Text mail structures in RTF-8 format of up to a few thousand words can be encrypted and securely forwarded using the GAN encryption model within a few seconds to minutes of computation time. Special characters that are mapped from object types to numeric values can be implemented independently and individually. Password encryption of complex passwords containing up to 100 or more characters can be realized as an integrated part of more complex encryption models for banking and insurance environmental applications [18–20].
For such purposes, there are different approaches to integrating Python in a Java runtime environment that is suitable for programming user software applications [21]. Jython is an implementation of Python that allows for the integration of the programming language Python in a Java framework. While all Python routines are accessible in the Jython environment, it only supports Python up to version 2. Process builders or Java Native Interface with CPython do provide another application to call Python scripts from Java that is compatible with all versions of Python. The programming language Python can also be integrated into other languages such as C/C++, JavaScript, .NET, and Go.
Compared to the RSA algorithm, security is enhanced by first providing private and public keys that scale linearly with the number of digits used for password representation. Starting from password sizes of 20−25 digits, one may thus overbid the security of an RSA approach with partial key sizes of around N = 16 bits. Applying encryption with N = 24 bits at password sizes of a few hundred digits, one can securely transfer passwords with total key sizes of up to a few thousand bits with the proposed GAN encryptor. Different and alternative encrypting algorithms, such as ElGamal Encryption [22], Elliptic Curve Cryptography, or Lattice-Based Cryptography [23], do work based on other computation methods but approximately provide the same security measure as the RSA algorithm in terms of encryption and decryption key sizes.
Secondly, security is conceptually enhanced since the circuit logic of GAN isn’t known to the users of the network, whereas the actual randomly generated configuration of logical gates is hidden from the developer of the software. That way, encrypted text can only be hacked if two parties (software user and developer) lack information security.
As illustrated in Table 2, the scaling of the security level as a function of the key size for the RSA, ECC, and GAN model algorithms (for a password string of size N = 24 characters) indicates that the GAN approach converges much faster to the same security level as a function of the required key size. The scaling of the security level with key size can be estimated as the square root of the key size for RSA, as a linear function for the ECC, and the GAN encryption model. Since the GAN model decomposed the total key into partial keys that, in total, form a general key of size N-bit, the computation time reduces by several orders of magnitude from the RSA to the GAN model. As compared e.g., to RSA and ECC encryption models, the GAN approach thus leads to the same security level for much lower required key sizes (per letter). In contrast, time complexity for hacking a generated private key scales exponentially for the GAN encryption model as a function of the total key size that is comparable to the total key sizes in RSA models.

In the present study, we have presented an encryption model for text encryption and decryption, respectively, based on a GAN encryptor that allows for secure RTF-8 text encryption. From modeling random keys that are unaccessible for decryption by any party of the GAN users without using the specific (protected) GAN encryptor model realization, i.e., sender, receiver, and software coordinator, the model implements the submission of encrypted text messages with reference keys from a sender to a receiver that build the foundation for decryption within the framework of the presented GAN prototype software. Encryption and decryption with total key sizes of up to
Integrating the GAN encryption model as a Python source code that encrypts and decrypts messages from a frontend of a standard email software may secure text messages that are sent from a sender to a receiver. Starting from the prototype as presented, this would require building a stable connection of the GAN encoder model to the runtime environment of the webmail software. To establish secure connections and to ensure correct encryption and decryption, challenges are to build the GAN model in a way that disables external hackers or malware from changing dynamically stored configurations of the GAN encryptor.
The model may build the foundation to develop commercial software technologies or integrated plugins in Python format from the presented basis model implemented in the Python 3 programming language. In the sequel to this paper, GAN encryptor configurations composed of NOT logical gates have been used mainly. More complex circuit configurations built from combinations of NOT and CNOT logical gates shall be subject to future work on the presented GAN encryption model.
Acknowledgement: I’d like to thank Adrian Dahl, Sven Engels, Fritz Fischer, Mert Köktürk, Renars Miculis, Sarah Rosa Werner, and Betül Yurtman for their contributions and discussions on the content of the presented work on a text encryption model with Generative Adversarial Networks.
Funding Statement: The author acknowledges financial support of IU International University of Applied Sciences and Constructor University for the lecturer positions at the universities.
Availability of Data and Materials: The data that support the findings of this study are openly available in TextMailEncryption at https://github.com/alexej-schelle/TextmailEncryption (accessed on 6 July 2025).
Ethics Approval: This study was conducted in accordance with the ethical standards of IU International University of Applied Sciences.
Conflicts of Interest: The author declares no conflicts of interest to report regarding the present study.
References
1. Rivest RL, Shamir A, Adleman L. A method for obtaining digital signatures and public-key cryptosystems. Commun ACM. 1978;21(2):120–6. doi:10.1145/359340.359342. [Google Scholar] [CrossRef]
2. Boneh D, Franklin M. Identity-based encryption from the Weil pairing. SIAM J Comput. 2003;32(3):586–615. doi:10.1137/s0097539701398521. [Google Scholar] [CrossRef]
3. Goodfellow I, Pouget-Abadie J, Mirza M, Xu B, Warde-Farley D, Ozair S, et al. Generative adversarial networks. Commun ACM. 2020;63(11):139–44. doi:10.1145/3422622. [Google Scholar] [CrossRef]
4. Donahue C, McAuley J, Puckette M. Adversarial audio synthesis [Internet]. Paper presented at: International Conference Learn Representations (ICLR); 2019 [cited 2025 Mar 22]. Available from: https://arxiv.org/abs/1802.04208. [Google Scholar]
5. Zhang R, Isola P, Efros AA. Colorful image colorization [Internet]. Paper presented at: The European Conference on Computer Vision (ECCV); 2016 [cited 2025 Mar 22]. Available from: https://arxiv.org/abs/1603.08511. [Google Scholar]
6. Karras T, Laine S, Aila T. A style-based generator architecture for generative adversarial networks. IEEE Trans Pattern Anal Mach Intell. 2021;43(6):1957–72. doi:10.1109/TPAMI.2020.2976433. [Google Scholar] [CrossRef]
7. Zhu J, Park T, Isola P, Efros AA. Unpaired image-to-image translation using cycle-consistent adversarial networks [Internet]. Paper presented at: IEEE International Conference on Computer Vision (ICCV); 2017; Venice, Italy [cited 2025 Mar 22]. Available from: https://arxiv.org/abs/1703.10593. [Google Scholar]
8. Brock A, Donahue J, Simonyan K. Large scale GAN training for high fidelity natural image synthesis. Paper presented at: International Conference on Learn Representations (ICLR); 2019; New Orleans, LA, USA [cited 2025 Mar 22]. Available from: https://arxiv.org/abs/1809.11096. [Google Scholar]
9. Rosenblatt F. The perceptron: a probabilistic model for information storage and organization in the brain. Psychol Rev. 1958;65(6):386–408. doi:10.1037/h0042519. [Google Scholar] [PubMed] [CrossRef]
10. Minsky M, Papert S. Perceptrons: an introduction to computational geometry. Cambridge, MA, USA: MIT Press; 1969. [Google Scholar]
11. Hu W, Tan Y, Wang X. Generative adversarial networks for cybersecurity: attacks, defenses, and future trends. ACM Comput Surv. 2022;55(3):1–36. doi:10.1145/3490237. [Google Scholar] [CrossRef]
12. Katz J, Lindell Y. Introduction to modern cryptography (4. Aufl.). Boca Raton, FL, USA: Chapman & Hall/CRC; 2025. [Google Scholar]
13. Stinson DR, Paterson MB. Cryptography: theory and practice. 4th ed. Boca Raton, FL, USA: CRC Press; 2023. [Google Scholar]
14. Mehlig B. Machine learning with neural networks: an introduction for scientists and engineers. Cambridge, UK: Cambridge University Press; 2021. [Google Scholar]
15. Mano MM, Ciletti MD. Digital design with an introduction to the Verilog HDL, VHDL, and systemVerilog. 6th ed. Hoboken, NJ, USA: Pearson; 2023. [Google Scholar]
16. Dahl A, Engels S, Fischer F, Köktürk M, Miculis R, Werner SR, et al. TextmailEncryption [Internet]. GitHub repository; [cited 2025 Mar 22]. Available from: https://github.com/alexej-schelle/TextmailEncryption. [Google Scholar]
17. Shannon CE. A mathematical theory of communication. Bell Syst Tech J. 1948;27(3):379–423. doi:10.1002/j.1538-7305.1948.tb01338.x. [Google Scholar] [CrossRef]
18. Smith J, Brown R. Core banking systems: architecture and integration. Cham, Switzerland: Springer; 2020. [Google Scholar]
19. Williams M. Modern insurance software solutions: trends and technologies. Hoboken, NJ, USA: Wiley; 2021. [Google Scholar]
20. Kumar A, Zhang L. Cybersecurity in financial and insurance software. J Fintech Secur. 2022;15(3):45–67. [Google Scholar]
21. Doe J, Smith J. A comparative study of Python and Java in modern software development. J Program Lang. 2020;15(3):45–60. [Google Scholar]
22. Ranasinghe R, Athukorala P. A generalization of the ElGamal public-key cryptosystem. J Discrete Math Sci Cryptogr. 2022;25(8):2395–403. doi:10.1080/09720529.2020.1857902. [Google Scholar] [CrossRef]
23. Regev O. On lattices, learning with errors, random linear codes, and cryptography. arXiv:2401.03703. 2024. doi:10.48550/arXiv.2401.03703. [Google Scholar] [CrossRef]
Cite This Article
Copyright © 2025 The Author(s). Published by Tech Science Press.This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.


Submit a Paper
Propose a Special lssue
View Full Text
Download PDF
Downloads
Citation Tools