Research Article

An Encryption Technique for Provably Secure Transmission from a High Performance Computing Entity to a Tiny One

Figure 3

Number () of different subsequence of length which can be obtained from a binary sequence of length : a numerical illustration of the statement of Theorem [9].