Synthesis of sets of non-symmetric two-operand two-bit crypto operations within the permutation accuracy
The object of research is the processes of building operations for cryptographic protection of information, as the requirements for information security are constantly increasing. Increasing the stability of cryptographic transformations directly depends on the complexity and variability of the cryp...
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
PC Technology Center
2020-03-01
|
Series: | Technology Audit and Production Reserves |
Subjects: | |
Online Access: | http://journals.uran.ua/tarp/article/view/202099 |