Implementation of butterfly key expansion scheme
A key extension and butterfly technology, applied in digital transmission systems, user identity/authority verification, secure communication devices, etc., can solve problems such as inability to use
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0051] In order to better understand the principle of the present invention, exemplary embodiments of the present invention are explained in more detail below with reference to the accompanying drawings. The drawings and descriptions provided herein may have been simplified in order to illustrate aspects relevant to a clear understanding of the devices, systems and methods described herein, while for clarity the other aspects of. Those of ordinary skill in the art will recognize that other elements and / or operations may be desired and / or required in order to implement the devices, systems, and methods described herein. Because these elements and operations are well known in the art, and because they do not promote a better understanding of the present disclosure, a discussion of these elements and operations is not provided here. However, the disclosure is considered to inherently include all such elements, changes and modifications of the described aspects known to those of ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


