This book is organized in topical sections on Encryption, Signature, Analysis, Application of Hash Functions, Universal Composability, ...
اقرأ المزيد
Design and analysis of symmetric key cryptosystems. – Primitives for symmetric key cryptography, including block and stream ...
اقرأ المزيد