January 1983
·
6 Reads
·
3 Citations
This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.
January 1983
·
6 Reads
·
3 Citations
... Therefore, only a restricted subset of mathematical functions is suitable as encryption or decryption functions. The safety of a cryptosystem against attacks depends essentially on the difficulty of calculating the inverse function [1]. ...
January 1983