Cryptography Reference
In-Depth Information
Fig. 4.9. An encryption example employing the proposed scheme.
Search WWH ::




Custom Search