Return to Article Details Technology of two operand operations construction of information cryptographic transformation by modeling results Download Download PDF