by
Cusick, Thomas W., 1943-
Format:
Electronic Resources
Excerpt:
Stream ciphers and number theory Cusick, Thomas W., 1943-
by
Cusick, Thomas W., 1943-
ScienceDirect An electronic book accessible through the World Wide Web; click for information
Table of contents http://www.loc.gov/catdir/toc/els051/2004040484.html
Publisher description http://www.loc.gov/catdir/description/els051/2004040484.html
Table of contents http://www.loc.gov/catdir/toc/els051/2004040484.html
Publisher description http://www.loc.gov/catdir/description/els051/2004040484.html
Format:
Electronic Resources
Excerpt:
Stream ciphers and number theory Cusick, Thomas W., 1943-
View Other Search Results
by
St. Denis, Tom.
Format:
Electronic Resources
Excerpt:
algorithms The subsequent chapters discuss the implementation of symmetric ciphers, one-way hashes, message
by
Weiss, Jason.
ScienceDirect An electronic book accessible through the World Wide Web; click for information
Table of contents http://www.loc.gov/catdir/toc/els051/2003070900.html
Publisher description http://www.loc.gov/catdir/description/els041/2003070900.html
Table of contents http://www.loc.gov/catdir/toc/els051/2003070900.html
Publisher description http://www.loc.gov/catdir/description/els041/2003070900.html
Format:
Electronic Resources
Excerpt:
programming * Covers the architecture of the JCE, symmetric ciphers, asymmetric ciphers, message digests
by
Martin, Keith M.
Format:
Electronic Resources
Excerpt:
encryption algorithms; 4.2 Stream ciphers; 4.3 Block ciphers; 4.4 The Data Encryption Standard; 4.5 The
Limit Search Results
Narrowed by: