Linked e-resources
Details
Table of Contents
Information Security
Cryptography
Bock Ciphers
Stream Ciphers
Hash Functions
Message Authentication Codes
Authenticated Encryption
Post-Quantum Cryptography
Efficient Implementations. Public key Cryptography
Applied Cryptography.
Cryptography
Bock Ciphers
Stream Ciphers
Hash Functions
Message Authentication Codes
Authenticated Encryption
Post-Quantum Cryptography
Efficient Implementations. Public key Cryptography
Applied Cryptography.