Return to Article Details Use of implementations of arbitrary bitness permutations for cryptographic transformations Download Download PDF