Cryptography Reference
In-Depth Information
(a)
(b)
(c)
(d)
(e)
(f)
(g)
FIGURE 7.13
(See color insert.) Results of Algorithms 8 where Encrypt cVCRG (P
x
,x, 4)
was based upon Algorithm 4 for VCRG-4 with respect to P
(Figure 7.9(a)):
(a)R
1
, (b)R
2
, (c)R
3
, (d)R
4
; (e)R
1
R
2
; (f)R
1
R
2
R
3
; (g)R
1
R
2
R
3
R
4
.
Search WWH ::
Custom Search