H. D. Knoble

  • Citations Per Year
Learn More
Although there is some computing literature available dealing with the topic of encryption and security transformations, the subject IS relatively new to most computation centers, and because of the nature of security perhaps, few implemented algorithms seem to be available. A one-way enciphering algorithm is described which evaluates a family of(More)
Received January 1976; revised September 1977 Permission to copy without fee all or part of this material is granted provided that the copies are not made or distributed for direct commercial advantage, the ACM copyright notice and the title of the publication and its date appear, and notice is given that copying is by permission of the Association for(More)
for k := 1 s t e p 1 u n t i l n do b e g i n t := x[k]; u := gamin X t; v := sin(u); u := cos(u); w := v X v; z := u X u; q := p[k]; r := v X u; h : = y [ k ] ; d : = q X h ; e : = q X t ; f : = e X h ; hl : = h l + q X w ; h 2 : = h 2 + q X z ; h 3 : = h 3 + q X r ; h 4 : = h h 4 + d X v ; h 5 : = h S b d X u ; h 6 : = h 6 + e X r ; h 7 : = h 7 + e X(More)
  • 1