Turkish Journal of Mathematics and Computer Science, cilt.18, sa.1, ss.289-295, 2026 (Scopus, TRDizin)
Thanks to the cryptosystem, confidential information can be transmitted securely. When we perform this encryption using matrices obtained from near soft sets, we increase our security even more. Accordingly, the equivalence relation used in this set will change according to the characteristics of the set that are restricted and the resulting encrypted word will change accordingly.