Return to Article Details Design and Implementation of an Encryption Algorithm Based on GF(5m) in Information Security Download Download PDF