Some further cryptographic applications of permutation polynomials

1987 
A cryptographic system is described based on the use of systems of permutation polynomials over finite fields or rings. The method involves two steps of encipherment, but more than two steps can be used if desired.
    • Correction
    • Source
    • Cite
    • Save
    • Machine Reading By IdeaReader
    0
    References
    10
    Citations
    NaN
    KQI
    []