<--- Back to Details
First PageDocument Content
Dynamical system / Logistic map / Cipher / Public-key cryptography / Integrated Encryption Scheme / Key / Butterfly effect / Index of cryptography articles / Probabilistic encryption / Cryptography / Chaos theory / Lorenz attractor
Date: 2012-08-10 06:17:36
Dynamical system
Logistic map
Cipher
Public-key cryptography
Integrated Encryption Scheme
Key
Butterfly effect
Index of cryptography articles
Probabilistic encryption
Cryptography
Chaos theory
Lorenz attractor

Microsoft Word - nljul2005_2_.doc

Add to Reading List

Source URL: www.barc.gov.in

Download Document from Source Website

File Size: 1,39 MB

Share Document on Facebook

Similar Documents

D:/Documents/Courses/Winter 2014/aez/rae.dvi

D:/Documents/Courses/Winter 2014/aez/rae.dvi

DocID: 1qyAn - View Document

Microsoft Word - nljul2005_2_.doc

Microsoft Word - nljul2005_2_.doc

DocID: 1giRn - View Document

Lazy Revocation in Cryptographic File Systems Michael Backes Christian Cachin  Alina Oprea

Lazy Revocation in Cryptographic File Systems Michael Backes Christian Cachin Alina Oprea

DocID: 1apk7 - View Document

CODING CONCEPTS  TUTORIAL BEN EVERARD WHY DO THIS? • Understand advanced

CODING CONCEPTS TUTORIAL BEN EVERARD WHY DO THIS? • Understand advanced

DocID: 18EFF - View Document

CSCI-GAMATH-GAIntroduction to Cryptography  April 25, 2012

CSCI-GAMATH-GAIntroduction to Cryptography April 25, 2012

DocID: 13Khz - View Document