Cryptographic information protection using extended finite fields | IEEE Conference Publication | IEEE Xplore