First Page | Document Content | |
---|---|---|
Date: 2006-08-01 04:04:38Group theory Public-key cryptography Hill cipher Substitution cipher Playfair cipher RSA Multiplicative order Modulo Cipher Cryptography Abstract algebra Modular arithmetic | Add to Reading ListSource URL: www.apprendre-en-ligne.netDownload Document from Source WebsiteFile Size: 142,09 KBShare Document on Facebook |
12 Example: Playfair Cipher Program file for this chapter: playfairDocID: 1dGvS - View Document | |
Security Engineering: A Guide to Building Dependable Distributed Systems C H A P TE R 5 CryptographyDocID: 1afiN - View Document | |
CHAPTER 5 Cryptography ZHQM ZMGM ZMFMDocID: 19j6Q - View Document | |
Lecture 2: Classical Encryption Techniques Lecture Notes on “Computer and Network Security” by Avi Kak ([removed]) January 20, 2015 9:44pm cDocID: 11e3U - View Document | |
Microsoft PowerPoint - 02-classical_encryption.pptxDocID: 117wF - View Document |