First Page | Document Content | |
---|---|---|
![]() Date: 2012-08-10 06:17:36Dynamical system Logistic map Cipher Public-key cryptography Integrated Encryption Scheme Key Butterfly effect Index of cryptography articles Probabilistic encryption Cryptography Chaos theory Lorenz attractor | Add to Reading List |
![]() | D:/Documents/Courses/Winter 2014/aez/rae.dviDocID: 1qyAn - View Document |
![]() | Microsoft Word - nljul2005_2_.docDocID: 1giRn - View Document |
![]() | Lazy Revocation in Cryptographic File Systems Michael Backes Christian Cachin Alina OpreaDocID: 1apk7 - View Document |
![]() | CODING CONCEPTS TUTORIAL BEN EVERARD WHY DO THIS? • Understand advancedDocID: 18EFF - View Document |
![]() | CSCI-GAMATH-GAIntroduction to Cryptography April 25, 2012DocID: 13Khz - View Document |