Cryptography Reference
In-Depth Information
(a)
(b)
(c)
(d)
(e)
(f)
(g)
FIGURE 7.6
Implementation results of Algorithm 6 for VCRG-3 with respect to B: (a) R 1 ,
(b) R 2 , (c) R 3 ; (d) R 1 R 2 , (e) R 1 R 3 , (f) R 2 R 3 ; (g) R 1 R 2 R 3 .
 
 
Search WWH ::




Custom Search