Research Article
Symmetric Encryption Algorithms in a Polynomial Residue Number System
Figure 4
Graphs of cryptographic strength dependencies in a logarithmic scale with base 10 of the proposed symmetric polynomial encryption algorithm in RNS from the number of modules and the powers of the polynomial (line 1, ; line 2, ; line 3, ; line 4, ; line 5, ; and line 6, algorithm AES-128).