作者: Vincent Rijmen , Torben Pryds Pedersen , Ivan Bjerre Damgaard
DOI:
关键词:
摘要: A data input is divided into two segments. The second segment raised to a power of function the first segment, being relatively prime predefined modulus. modulus then applied result. transformed assembled from and remainder modulo This transformation can be in combination with key derivation algorithm, wrapping or an encryption algorithm enhance security these other applications.