Cryptography Reference
In-Depth Information
(a)
(b)
(c)
(d)
(e)
(f)
(g)
FIGURE 7.13
(See color insert.) Results of Algorithms 8 where Encrypt cVCRG (P x ,x, 4)
was based upon Algorithm 4 for VCRG-4 with respect to P (Figure 7.9(a)):
(a)R 1 , (b)R 2 , (c)R 3 , (d)R 4 ; (e)R 1 R 2 ; (f)R 1 R 2 R 3 ; (g)R 1
R 2 R 3 R 4 .
 
 
Search WWH ::




Custom Search