Sorry, we do not have enough data to show an influence graph for this author.

#### Filter Results:

#### Co-author

#### Key Phrase

#### Publication Venue

Learn More

Although there is some computing literature available dealing with the topic of encryption and security transformations, the subject IS relatively new to most computation centers, and because of the nature of security perhaps, few implemented algorithms seem to be available. A one-way enciphering algorithm is described which evaluates a family of… (More)

DESCRIPTION This algorithm is a Fortran implementation of the procedures developed in [1]. Its purpose is to serve as a machine independent model for studying the evaluation of polynomials mod P and for the implementation of more efficient machine dependent system utility programs for enciphering passwords. ALGORITHM [Summary information and part of the… (More)

- ‹
- 1
- ›