摘要 |
<p>When an encrypting decrypting module is being used, there are various methods for determining the key or keys used by said module by analysing the module input or output data. To remedy this inconvenience, the inventive multiple module method is characterised in that the downstream module starts its encrypting decrypting operations as soon as part of the results of the upstream module is available.</p> |