Some Further Cryptographic Applications of Permutation Polynomials
暂无分享,去创建一个
A cryptographic system is described based on the use of systems of permutation polynomials over finite fields or rings. The method involves two steps of encipherment, but more than two steps can be used if desired.