Return to Article Details Analysis of the Application of Logical Operations to Cryptographic Transformations of Information Security Means Download Download PDF