Computer cryptographic techniques for processing and storage of confidential information†
作者:
E. V. KKISHNAMUKTHY,
期刊:
International Journal of Control
(Taylor Available online 1970)
卷期:
Volume 12,
issue 5
页码: 753-761
ISSN:0020-7179
年代: 1970
DOI:10.1080/00207177008931888
出版商: Taylor & Francis Group
数据来源: Taylor
摘要:
This paper is concerned with basic techniques that are suitable for computational cryptography. The difficulties involved in constructing suitable crypto-programmes as well as the criteria for the choice of crypto-programmes are discussed. The relevant mathematical properties of transformations are worked out. On this basis, suitable transformation techniques such as arithmetical, logic, matrix, topological, functional and hierarchical schemes are described. Finally, a brief discussion is given on the system design for crypto -programming.
点击下载:
PDF (391KB)
返 回