Return to Article Details Key compression techniques for cryptosystems Download Download PDF