Fig. 2
From: Secure data transmission through fractal-based cryptosystem: a Noor iteration approach

Encryption (a) and decryption (b) mechanisms use public keys generated by the sender and the receiver.
From: Secure data transmission through fractal-based cryptosystem: a Noor iteration approach
Encryption (a) and decryption (b) mechanisms use public keys generated by the sender and the receiver.