Inverse Properties in Neutrosophic Triplet Loop and Their Application to Cryptography
Abstract
:1. Introduction
1.1. Generalized Group
- (i)
- for all .
- (ii)
- For each , there exists a unique such that (existence and uniqueness of identity element).
- (iii)
- For each , there exists such that (existence of inverse element).
- (i)
- is a groupoid.
- (ii)
- For each , there exists a unique such that .
- (iii)
- For each , there exists such that .
- (i)
- For each , there exists a unique .
- (ii)
- and whenever .
- (iii)
- If G is commutative, then G is a group.
1.2. Neutrosophic Triplet Group
- 1.
- A generalized loop is a generalized group if and only if it is associative.
- 2.
- A neutrosophic triplet loop (NTL) is a neutrosophic triplet group if and only if it is associative.
- 3.
- An NTL is a generalized loop if and only if is unique for each x.
- 4.
- An NTL is a loop if and only if it is a quasigroup and for all .
- 1.
- .
- 2.
- .
- 3.
- .
- 4.
- .
- 5.
- i.e., .
- 6.
- for any ; .
- 7.
- i.e. .
- 1
- is called the right associator of if .
- 2.
- is called the left associator of if .
- 3.
- is called the right commutator of if .
- 4.
- is called the right commutator of if .
2. Main Results
- 1.
- , and .
- 2.
- .
- 3.
- X is an RIPNTL if and only X is an LIPNTL.
- 4.
- and .
- 1.
- Equations and have solutions for and these solutions are unique for all . (unique solvability)
- 2.
- The cancellation laws hold.
- 3.
- The right and left translation maps and are bijections for all .
- (1)
- . Similarly, .Let such that .
- (2)
- This follows from 1.
- (3)
- given by . is a bijection if and only if the equation is uniquely solvable for x for all . given by . is a bijection if and only if the equation is uniquely solvable for x for all .
- . Similarly, .Let such that .
- This follows from above.
- given by . is a bijection if and only if the equation is uniquely solvable for x for all . given by . is a bijection if and only if the equation is uniquely solvable for x for all .
- 1.
- X is an RCIPNTL if and only if .
- 2.
- X is an LCIPNTL if and only if .
- 3.
- X is a CIPNTL if and only if .
- By Lemma 2, if X is an RCIPNTL, then it is a left quasigroup and is a bijection for .Consider an NTL which has the property . Put to get . Thus, . Let . Then, . So, is uniquely solvable for x that is bijective.RCIP implies . Conversely, RCIP.
- By Lemma 2, if X is an LCIPNTL, then it is a right quasigroup and is a bijection for .Consider an NTL which has the property . Put to get . Thus, . Let . Then, . So, is uniquely solvable for x that is bijective.LCIP implies . Conversely, LCIP.
- This follows from 1. and 2.
- 1.
- , and .
- 2.
- .
- 3.
- X is an RCIPNL if and only X is an LCIPNL.
- 4.
- and .
- 1.
- .
- 2.
- .
- 3.
- .
- 4.
- .
- 5.
- .
- 6.
- .
- 7.
- .
- 8.
- .
- 9.
- .
- 10.
- and .
- 11.
- X is commutative if and only if if and only if .
- 12.
- If X is commutative, then X is normal if and only if if and only if .
- 13.
- X is normal if and only if if and only if if and only if if and only if .
- 14.
- .
- 15.
- .
- 1 and 2
- From the right associator, . Hence, .From the left associator, . Hence, .
- 3 and 4
- From the right associator, . Hence, .From the left associator, . Hence, .
- 5 and 6
- From the right commutator, . Similarly, .From the left commutator, . Similarly, .
- 7
- From the right commutator, . From the left commutator, .
- 8 and 9
- From the right commutator, . Similarly, .From the left commutator, . Similarly, .
- 10
- From the right commutator, . From the left commutator, .
- 11
- This follows from 10.
- 12
- This follows from 6 and 10.
- 13
- We shall use 10.X is normal if and only ifX is normal if and only if
- 14
- Apply the right and left associators.
- 15
- Apply the right and left associators.
- 1.
- Let X be an RIPNL. X is a CIPNTL if and only if X is commutative.
- 2.
- Let X be an LIPNL. X is a CIPNTL if and only if X is commutative.
- 3.
- Let X be commutative. The following are equivalent:
- (a)
- RIP.
- (b)
- LIP.
- (c)
- RCIP.
- (d)
- LCIP.
- Let X be an RIPNL. Then, . RCIP implies . Conversely, RIP and commutativity imply and imply RCIP and LCIP.
- Let X be an LIPNL. Then, . LCIP implies . Conversely, LIP and commutativity imply and imply RCIP and LCIP.
- This follows from 1 and 2.
- Let X be commutative. X has the RIP iff iff X has the LIP. X has the RIP iff iff X has the RCIP. X has the RIP iff iff X has the LCIP.
- 1.
- .
- 2.
- .
- 3.
- .
- 4.
- .
- 5.
- and .
- 6.
- .
- 7.
- .
- 8.
- .
- 9.
- .
- 10.
- .
- 11.
- and .
- 12.
- .
- 13.
- .
- From the right associator, . Hence, .
- From the right associator, . Hence, .
- From the left associator, . Hence, .
- From the left associator, . Hence, .
- From the right commutator, . From the left commutator, .
- By 1 and 3, .
- By 2 and 4, .
- This follows combining by 1 and 4.
- This follows combining by 2 and 4.
- This follows combining by 3 and 4.
- Apply 5.
- Apply the right and left associators.
- Apply the right and left associators.
- 1.
- is unique for each .
- 2.
- is unique for each .
- 3.
- X is a generalized loop and a quasigroup.
- 4.
- X is a loop if and only if for all .
- 5.
- If X is associative, then X is a loop and group.
- 6.
- X is a group if and only if X is associative.
- By Lemma 2(2), .
- By Lemma 2(2), .
- These follow by 1. and Lemma 2(1).
- By the definition of NTL and loop, and 2.
- An associative quasigroup is a loop and a group.
- A loop is a group if and only it is associative.
- 1.
- If X is an IPNTL, then for all :
- (a)
- X is an AAIPNL.
- (b)
- and .
- (c)
- and .
- (d)
- X is a WIPNTL.
- 2.
- If X is a CIPNTL, then for all :
- (a)
- X is an AIPNTL.
- (b)
- and .
- (c)
- and .
- (d)
- X is a WIPNTL.
- 3.
- If X is an RCIPNTL, then for all :
- (a)
- X is an AIPNTL.
- (b)
- .
- (c)
- and if and only if .
- (d)
- X is an RWIPNTL.
- 4.
- If X is an LCIPNTL, then for all :
- (a)
- X is an AIPNL.
- (b)
- .
- (c)
- and if and only if .
- (d)
- X is an LWIPNTL.
- Let X be an IPNTL.
- (a)
- AAIP. So, X is an AAIPNL.
- (b)
- RIP implies . LIP implies .
- (c)
- . Also, .
- (d)
- LWIP. Also, RWIP. So, X is a WIPNTL.
- Let X be a CIPNTL.
- (a)
- AIP. So, X is an AIPNL.
- (b)
- By Theorem 2: RCIP implies that and LCIP implies that .
- (c)
- . Also, .
- (d)
- LWIP. Also, RWIP. So, X is a WIPNTL.
- Let X be an RCIPNTL.
- (a)
- AIP. So, X is an AIPNL.
- (b)
- By Theorem 2: RCIP implies that .
- (c)
- . So, .Also, . So, .
- (d)
- RWIP. So, X is an RWIPNTL.
- Let X be an LCIPNTL.
- (a)
- AIP. So, X is an AIPNL.
- (b)
- By Theorem 2: LCIP implies that .
- (c)
- . So, .Also, . So, .
- (d)
- LWIP. So, X is an LWIPNTL.
- 1.
- If X is an LWIPNTL, then for all :
- (a)
- .
- (b)
- .
- (c)
- and .
- (d)
- .
- (e)
- J is a bijection.
- (f)
- X is a left quasigroup.
- (g)
- is a bijection.
- 2.
- If X is an RWIPNTL, then for all :
- (a)
- .
- (b)
- .
- (c)
- and .
- (d)
- .
- (e)
- J is a bijection.
- (f)
- X is a right quasigroup.
- (g)
- is a bijection.
- 3.
- The following are equivalent.
- (a)
- X is an LWIPNTL and is bijective.
- (b)
- X is an RWIPNTL and is bijective.
- (c)
- X is an LWIPNTL and X is a right quasigroup.
- (d)
- X is an RWIPNTL and X is a left quasigroup.
- 4.
- If X is a WIPNTL, then .
- 5.
- If X is an LCIPNTL, then X is a right quasigroup.
- 6.
- If X is an RCIPNTL, then X is a left quasigroup.
- Let X be an LWIPNTL, then .Put to getPut to get(19) impliesPut to getPut to getLet . Then, . So, J is 1-1. For all , there exists such that because .Consider . Let . For all , there exists such that because .
- Let X be an RWIPNTL, then .Put to getPut to get(24) impliesPut to getPut to getLet . Then, . So, J is 1-1. For all , there exists such that because .Consider . Let . For all , there exists such that because .
- X is an LWIPNTL if and only if and X is an RWIPNTL if and only if .X is an LWIPNTL and is bijective if and only if and is bijective if and only if and is bijective if and only if X is an RWIPNTL and is bijective.For a groupoid X: is bijective for all if and only if X is a left quasigroup and is bijective for all if and only if X is a right quasigroup. Hence, (a) to (d) are equivalent.
- If X is a WIPNTL, then it is both an LWIPNTL and RWIPNTL which implies that and . Consequently, and . Thus, .
- This follows from Lemma 2.
- This follows from Lemma 2.
- 1.
- X has the LWIP and AAIP, then X has the RIP.
- 2.
- X has the RWIP and AAIP, then X has the LIP.
- 3.
- X has the LWIP and AIP, then X has the RCIP.
- 4.
- X has the RWIP and AIP, then X has the LCIP.
- 5.
- X is an IPNTL if and only if X is a WIPNTL and an AAIPNTL.
- 6.
- X is a CIPNTL if and only if X is a WIPNTL and an AIPNTL.
- LWIP implies RIP.
- RWIP implies LIP.
- LWIP implies RCIP.
- RWIP implies LCIP.
- This backward of the statement follows by 1 and 2, while the forward of the statement follows by 1 of Theorem 5.
- This backward of the statement follows by 3 and 4, while the forward of the statement follows by 2 of Theorem 5.
- 1.
- If X is an AIPNTL, then
- (a)
- .
- (b)
- .
- 2.
- If X is an AAIPNTL, then
- (a)
- .
- (b)
- .
- 3.
- If X is an AIPNTL (AAIPNTL), then X is an AAIPNTL (AIPNTL) if and only if .
- 4.
- Let X be an AIPNTL (AAIPNTL), then X is an AAIPNTL (AIPNTL) if
- (a)
- or
- (b)
- .
- Let X be an AIPNTL. Then, .
- Let X be an AAIPNTL. Then, .
- This follows from the AIP and AAIP.
- This follows from the AIP and AAIP.
- 1.
- is a non-associative commutative NTL.
- 2.
- The following are equivalent.
- (a)
- is a CIPNTL.
- (b)
- is an IPNTL.
- (c)
- .
- is a groupoid by the definition of ∗.
- Commutativity
- . So, is commutative.
- Neutrality
- . Similarly, .
- Opposite
- . Similarly, . So, is a NTL. So, is an NTL.
- Non-Associativity
- and . So, .
is a non-associative commutative NTL. - Going by 3. of Lemma 4, it suffices to only show that is a RIPL. has the RIP if and only if .
3. Application to Cryptography
- RCIPNTL
- Assume that the message to be transmitted can be represented as a single element . Then, this is enciphered by pre-multiplying by another element so that the cipher text is . At the receiving end, the cipher text is deciphered by post-multiplying by to get the plain text.
- LCIPNTL
- Assume that the message to be transmitted can be represented as a single element . Then, this is enciphered by post-multiplying by another element so that the cipher text is . At the receiving end, the cipher text is deciphered by pre-multiplying by to get the plain text.
- RIPNTL
- Assume that the message to be transmitted can be represented as a single element . Then, this is enciphered by post-multiplying by another element so that the cipher text is . At the receiving end, the cipher text is deciphered by post-multiplying by to get the plain text.
- LIPNTL
- Assume that the message to be transmitted can be represented as a single element . Then, this is enciphered by pre-multiplying by another element so that the cipher text is . At the receiving end, the cipher text is deciphered by pre-multiplying by to get the plain text.
Author Contributions
Conflicts of Interest
References
- Araujo, J.; Konieczny, J. Molaei’s Generalized Groups are Completely Simple Semigroups. Bul. Inst. Polytech. Jassy Sect. I. Mat. Mec. Teor. Fiz. 2002, 48, 1–5. [Google Scholar]
- Vagner, V. Generalized Groups. Dokl. Akad. Nauk SSSR 1952, 84, 1119–1122. (In Russian) [Google Scholar]
- Molaei, M.R. Generalized actions. In Proceedings of the First International Conference on Geometry, Integrability and Quantization, Varna, Bulgaria, 1–10 September 1999; pp. 175–180. [Google Scholar]
- Molaei, M.R. Generalized groups. Bull. Inst. Polit. Di. Iase Fasc. 1999, 3, 21–24. [Google Scholar]
- Mehrabi, M.; Molaei, M.R.; Oloomi, A. Generalized subgroups and homomorphisms. Arab J. Math. Sci. 2000, 6, 1–7. [Google Scholar]
- Agboola, A.A.A. Certain properties of generalized groups. Proc. Jangjeon Math. Soc. 2004, 7, 137–148. [Google Scholar]
- Adeniran, J.O.; Akinmoyewa, J.T.; Solarin, A.R.T.; Jaiyeola, T.G. On some algebraic properties of generalized groups. Acta Math. Acad. Paedagog. Nyhazi. 2011, 27, 23–30. [Google Scholar]
- Fatehi, F.; Molaei, M.R. On Completely Simple Semigroups. Acta Math. Acad. Paedagog. Nyhazi. 2012, 28, 95–102. [Google Scholar]
- Agboola, A.A.A. Smooth generalized groups. J. Niger. Math. Soc. 2004, 23, 6–76. [Google Scholar]
- Agboola, A.A.A. Smooth generalized subgroups and homomorphisms. Adv. Stud. Contemp. Math. 2004, 9, 183–193. [Google Scholar]
- Molaei, M.R. Topological generalized groups. Int. J. Appl. Math. 2000, 2, 1055–1060. [Google Scholar]
- Molaei, M.R.; Tahmoresi, A. Connected topological generalized groups. Gen. Math. 2004, 12, 13–22. [Google Scholar]
- Maleki, H.; Molaei, H. On the quotient space of a generalized action of a generalized group. arXiv, 2014; arXiv:1402.3408. [Google Scholar]
- Bruck, R.H. A Survey of Binary Systems; Springer: Berlin/Göttingen/Heidelberg, Germany, 1966. [Google Scholar]
- Chein, O.; Pflugfelder, H.O.; Smith, J.D.H. Quasigroups and Loops: Theory and Applications; Sigma Series in Pure Mathematics 8; Heldermann: Berlin, Germany, 1990; ISBN 3-88538-008-0. [Google Scholar]
- Dene, J.; Keedwell, A.D. Latin Squares and Their Applications; Elsevier/North-Holland: Amsterdam, The Netherlands, 2015; ISBN 978-0-444-63555-6. [Google Scholar]
- Goodaire, E.G.; Jespers, E.; Milies, C.P. Alternative Loop Rings; North-Holland Mathematics Studies 184; North-Holland: Amsterdam, The Netherlands, 1996. [Google Scholar]
- Jaiyéọlá, T.G. A Study of New Concepts in Smarandache Quasigroups and Loops; Books on Demand, ProQuest Information and Learning: Ann Arbor, MI, USA, 2009. [Google Scholar]
- Pflugfelder, H.O. Quasigroups and Loops: Introduction; Sigma Series in Pure Math. 7; Heldermann: Berlin, Germany, 1990. [Google Scholar]
- Vasantha Kandasamy, W.B. Smarandache Loops; Department of Mathematics, Indian Institute of Technology: Madras, India, 2002. [Google Scholar]
- Smarandache, F. A Unifying Field in Logics. Neutrosophy: Neutrosophic Probability, Set and Logic; American Research Press (ARP): Rehoboth, NM, USA, 2003; ISBN 1-879585-76-6. [Google Scholar]
- Smarandache, F. Neutrosophic set, a generalization of the intuitionistic fuzzy set. In Proceedings of the 2006 IEEE International Conference on Granular Computing, Atlanta, GA, USA, 10–12 May 2006; pp. 38–42. [Google Scholar] [CrossRef]
- Zadeh, L.A. Information and control. Fuzzy Sets 1965, 8, 338–353. [Google Scholar]
- Atanassov, A.K. Intuitionistic fuzzy sets. Fuzzy Sets Syst. 1986, 20, 87–96. [Google Scholar] [CrossRef]
- Liu, P.; Liu, J.; Chen, SM. Some intuitionistic fuzzy Dombi Bonferroni mean operators and their application to multi-attribute group decision making. J. Oper. Res. Soc. 2018, 69, 1–24. [Google Scholar] [CrossRef]
- Liu, P.; Chen, S.M. Group decision making based on Heronian aggregation operators of intuitionistic fuzzy numbers. IEEE Trans. Cybern. 2017, 47, 2514–2530. [Google Scholar] [CrossRef] [PubMed]
- Liu, P.; Chen, S.M. Multiattribute Group Decision Making Based on Intuitionistic 2-Tuple Linguistic Information. Inf. Sci. 2018, 430–431, 599–619. [Google Scholar] [CrossRef]
- Liu, P. Multiple attribute group decision making method based on interval-valued intuitionistic fuzzy power Heronian aggregation operators. Comput. Ind. Eng. 2017, 108, 199–212. [Google Scholar] [CrossRef]
- Liu, P.; Li, H. Interval-valued intuitionistic fuzzy power Bonferroni aggregation operators and their application to group decision making. Cognit. Comput. 2017, 9, 494–512. [Google Scholar] [CrossRef]
- Liu, P.; Liu, J.; Merigo, J.M. Partitioned Heronian means based on linguistic intuitionistic fuzzy numbers for dealing with multi-attribute group decision making. Appl. Soft Comput. 2018, 62, 395–422. [Google Scholar] [CrossRef]
- Liu, P.; Shi, L. Some Neutrosophic uncertain linguistic number Heronian mean operators and their application to multi-attribute group decision making. Neural Comput. Appl. 2017, 28, 1079–1093. [Google Scholar] [CrossRef]
- Liu, P.; Zhang, L.; Liu, X.; Wang, P. Multi-valued Neutrosophic number Bonferroni mean operators and their application in multiple attribute group decision making. Int. J. Inf. Technol. Decis. Mak. 2016, 15, 1181–1210. [Google Scholar] [CrossRef]
- Vasantha Kandasamy, W.B.; Smarandache, F. Some Neutrosophic Algebraic Structures and Neutrosophic n-Algebraic Structures; Hexis: Frontigan, France, 2006. [Google Scholar]
- Vasantha Kandasamy, W.B.; Smarandache, F. N-Algebraic Structures and s-n-Algebraic Structures; Hexis: Phoenix, AZ, USA, 2006. [Google Scholar]
- Vasantha Kandasamy, W.B.; Smarandache, F. Basic Neutrosophic Algebraic Structures and Their Applications to Fuzzy and Neutro-Sophic Models; Hexis: Frontigan, France, 2004. [Google Scholar]
- Smarandache, F.; Ali, M. Neutrosophic triplet group. Neural Comput. Appl. 2016. [Google Scholar] [CrossRef]
- Smarandache, F.; Ali, M. Neutrosophic triplet as extension of matter plasma, unmatter plasma, and antimatter plasma. In Proceedings of the 69th Annual Gaseous Electronics Conference, Bochum, Germany, 10–14 October 2016; Available online: http://meetings.aps.org/Meeting/GEC16/Session/HT6.111. (accessed on 14 March 2018).
- Jaiyéọlá, T.G. Some Results on Neutrosophic Triplet Group. in press.
- Okpako, A.E.; Asagba, P.O. A Framework for Diagnosing Confusable Diseases using Neutrosophic based Neural Network. Int. J. Comput. Appl. 2017, 167, 1–7. [Google Scholar]
- Sahin, M.; Kargin, A. Neutrosophic Triplet Normed Space. Open Phys. 2017, 15, 697–704. [Google Scholar] [CrossRef]
- Vasantha Kandasamy, W.B.; Ilanthenral, K.; Smarandache, F. Neutrosophic Triplet Groups and Their Applications to Mathematical Modelling; EuropaNova ASBL: Bruxelles, Belgium, 2017. [Google Scholar]
- Smarandache, F. Neutrosophic Perspectives: Triplets, Duplets, Multisets, Hybrid Operators, Modal Logic, Hedge Algebras and Applications; Pons Publishing House: Brussels, Belgium, 2017. [Google Scholar]
- Agboola, A.A.A.; Davvaz, B.; Smarandache, F. Neutrosophic quadruple algebraic hyperstructures. Ann. Fuzzy Math. Inform. 2017, 14, 29–42. [Google Scholar]
- Zhang, X.; Smarandache, F.; Liang, X. Neutrosophic Duplet Semi-Group and Cancellable Neutrosophic Triplet Groups. Symmetry 2017, 9, 275. [Google Scholar] [CrossRef]
- Keedwell, A.D. Crossed-inverse quasigroups with long inverse cycles and applications to cryptography Australas. J. Comb. 1999, 20, 241–250. [Google Scholar]
- Keedwell, A.D.; Shcherbacov, V.A. On m-inverse loops and quasigroups with a long inverse cycle. Australas. J. Comb. 2002, 26, 99–119. [Google Scholar]
- Keedwell, A.D.; Shcherbacov, V.A. Construction and properties of (r,s,t)-inverse quasigroups I. Discret. Math. 2003, 266, 275–291. [Google Scholar] [CrossRef]
- Keedwell, A.D.; Shcherbacov, V.A. Construction and properties of (r,s,t)-inverse quasigroups II. Discret. Math. 2004, 288, 61–71. [Google Scholar]
- Keedwell, A.D.; Shcherbacov, V.A. Quasigroups with an inverse property and generalized parastrophic identities. Quasigroups Relat. Syst. 2005, 13, 109–124. [Google Scholar]
- Jaíyéọlá, T.G. An holomorphic study of Smarandache automorphic and cross inverse property loops. Sci. Magna J. 2008, 4, 102–108. [Google Scholar]
- Jaíyéọlá, T.G. A double cryptography using the Smarandache Keedwell cross inverse quasigroup. Int. J. Math. Comb. 2008, 3, 28–33. [Google Scholar]
- Jaíyéọlá, T.G. Some isotopy-isomorphy conditions for m-inverse quasigroups and loops. Analele Stiintifice Univ. Ovidius Constanta Ser. Mat. 2008, 16, 57–66. [Google Scholar]
- Jaíyéọlá, T.G. On a pair of universal weak inverse property loops. NUMTA Bull. 2009, 3, 22–40. [Google Scholar]
- Jaíyéọlá, T.G. On middle universal weak and cross inverse property loops with equal length of inverse cycles. Rev. Colomb. Mat. 2010, 44, 79–89. [Google Scholar]
- Jaíyéọlá, T.G. On middle universal m-inverse quasigroups and their applications to cryptography. Analele Univ. Vest Timis. Ser. Mat.-Inform. 2011, 49, 69–87. [Google Scholar]
- Jaiyéọlá, T.G.; Adéníran, J.O. Weak inverse property loops and some isotopy-isomorphy properties. Analele Univ. Vest Timis. Ser. Mat.-Inform. 2009, 49, 69–87. [Google Scholar]
- Jaíyéọlá, T.G. The Study of the Universality of Osborn Loops. Ph.D. Thesis, University of Agriculture, Abeokuta, Nigeria, 2009. [Google Scholar]
- Jaiyéọlá, T.G.; Adéníran, J.O. New identities in universal Osborn loops. Quasigroups Relat. Syst. 2009, 17, 55–76. [Google Scholar]
- Jaiyéọlá, T.G. On three cryptographic identities in left universal Osborn loops. J. Discret. Math. Sci. Cryptogr. 2011, 14, 33–50. [Google Scholar] [CrossRef]
- Jaiyéọlá, T.G. On two cryptographic identities in universal Osborn loops. J. Discret. Math. Sci. Cryptogr. 2013, 16, 95–116. [Google Scholar] [CrossRef]
- Jaiyéọlá, T.G.; Adéníran, J.O. On another two cryptographic identities in universal Osborn loops. Surv. Math. Its Appl. 2010, 5, 17–34. [Google Scholar]
© 2018 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
Share and Cite
Jaiyeola, T.G.; Smarandache, F. Inverse Properties in Neutrosophic Triplet Loop and Their Application to Cryptography. Algorithms 2018, 11, 32. https://doi.org/10.3390/a11030032
Jaiyeola TG, Smarandache F. Inverse Properties in Neutrosophic Triplet Loop and Their Application to Cryptography. Algorithms. 2018; 11(3):32. https://doi.org/10.3390/a11030032
Chicago/Turabian StyleJaiyeola, Temitope Gbolahan, and Florentin Smarandache. 2018. "Inverse Properties in Neutrosophic Triplet Loop and Their Application to Cryptography" Algorithms 11, no. 3: 32. https://doi.org/10.3390/a11030032
APA StyleJaiyeola, T. G., & Smarandache, F. (2018). Inverse Properties in Neutrosophic Triplet Loop and Their Application to Cryptography. Algorithms, 11(3), 32. https://doi.org/10.3390/a11030032