Back to Results
First PageMeta Content



Chapter 8 Implementation Pitfalls We have now learned about several very important cryptographic objects, including block ciphers, encryption schemes, message authentication schemes, and hash functions. Moreover, we disc
Add to Reading List

Document Date: 2005-03-01 14:19:32


Open Document

File Size: 127,23 KB

Share Result on Facebook