Search
for Author
All Reviews
Yu, K
Options:
All Media Types
Journals
Proceedings
Div Books
Whole Books
Other
Date Reviewed
Title
Author
Publisher
Published Date
Descending
Ascending
Date Reviewed
1
-
2
of
2
reviews
Superimposing encrypted data
Yu K., Yu T. Communications of the ACM 34(2): 48-54, 1991. Type: Article
The authors are concerned with the processing of encrypted data. For example, could we take an encrypted amount in hundreds of dollars and convert it to yen (that is, multiply it by a known constant, such as 12,689), thus obtaining a...
...
Aug 1 1991
Data encryption based upon time reversal transformations
Yu K., Yu T. The Computer Journal 32(3): 241-245, 1989. Type: Article
This paper proposes arranging data to be encrypted into a matrix
X
with elements ranging from 1 to
k
inclusive and applying the transformation
X
(
T
+ 1) = [
f
(
X
(
T
)) - −
X
(...
...
Mar 1 1990
Reproduction in whole or in part without permission is prohibited. Copyright 1999-2024 ThinkLoud
®
Terms of Use
|
Privacy Policy