Return to Article Details
Use of implementations of arbitrary bitness permutations for cryptographic transformations
Download
Download PDF