User's Manual

29
Figure 5.5 – Procedure for data cryptography