Research Article
An Encryption Technique for Provably Secure Transmission from a High Performance Computing Entity to a Tiny One
Figure 4
Numerical examples related to Theorem 7: illustration of the security gain implied by a binary channel with embedding of random bits noting that smaller means higher security enhancement.