First Page | Document Content | |
---|---|---|
Date: 2010-04-15 11:12:49Affine cipher Caesar cipher Ciphertext Cipher Cryptanalysis Known-plaintext attack One-time pad Vigenère cipher Transposition cipher Cryptography Stream ciphers Substitution cipher | Cryptology: From Caesar Ciphers to Public-Key Cryptosystems Author(s): Dennis Luciano and Gordon Prichett Source: The College Mathematics Journal, Vol. 18, No. 1 (Jan., 1987), pp. 2-17Add to Reading ListSource URL: www.math.sunysb.eduDownload Document from Source WebsiteFile Size: 1,73 MBShare Document on Facebook |
brand eins Online Develop Montag, 15. September 2008DocID: 1oWFJ - View Document | |
Survivor Channeling Grief Into Policy ChangeDocID: 1oHEM - View Document | |
Dancing on the Lip of the Volcano: Chosen Ciphertext Attacks on Apple iMessage Christina Garman Johns Hopkins UniversityDocID: 1mvRo - View Document | |
Cryptanalytic Tools Authors: Prof. Dr.-Ing. Tim Güneysu Dipl. Ing. Alexander Wild B. Sc. Tobias SchneiderDocID: 1mhiR - View Document | |
ISSNPrint) ISSNOnline) Computer Science for Fun Issue 14DocID: 1lTTG - View Document |