Cryptography Reference
In-Depth Information
(a)
(b)
(c)
(d)
(e)
(f)
(g)
FIGURE 7.5
Implementation results of Algorithm 5 for VCRG-3 with respect to B: (a) R
1
,
(b) R
2
, (c) R
3
; (d) R
1
R
2
, (e) R
1
R
3
, (f) R
2
R
3
; (g) R
1
R
2
R
3
.
Search WWH ::
Custom Search