by
Solanas, Agusti.
Format:
Electronic Resources
Excerpt:
. Attacks -- 3.7.2. Cryptosystems classification -- 3.7.2.1. Substitution, transposition and product ciphers
by
Wang, Jie.
Format:
Electronic Resources
Excerpt:
-- 2.6.3 OCB Decryption and Tag Verification -- 2.7 Stream Ciphers -- 2.7.1 RC4 Stream Cipher -- 2.7.2
by
Lee, Byeong Gi.
Format:
Electronic Resources
Excerpt:
.1 Cryptography -- 8.1.2 Encrypted Communication -- 8.1.3 Ciphers and Hash Functions -- 8.1.4
by
Bosworth, Seymour.
Format:
Electronic Resources
Excerpt:
Polyalphabetical Substitution Ciphers -- 7.2.7 The Vigenère Cipher -- 7.2.8 Early-Twentieth-Century Cryptanalysis
by
Turner, Kenneth J.
Format:
Electronic Resources
Excerpt:
-- 8.2.1 Symmetric key ciphers -- 8.2.2 Public key ciphers -- 8.2.3 Key management -- 8.2.4 Hashes -- 8
by
Rhee, Man Young.
Format:
Electronic Resources
Excerpt:
Algorithm -- 3.5.1 KASUMI Encryption Function -- Chapter 4 Symmetric Block Ciphers -- 4.1 Data Encryption
Limit Search Results