|
.. (Parent Directory)
|
| Appendix.pdf |
331,710 |
PDF |
CARO |
| Chapter 01 - Overview of Cryptography.pdf |
343,046 |
PDF |
CARO |
| Chapter 02 - Mathematical Background.pdf |
301,407 |
PDF |
CARO |
| Chapter 03 - Number-Theoretic Reference Problems.pdf |
397,013 |
PDF |
CARO |
| Chapter 04 - Public-Key Parameters.pdf |
331,301 |
PDF |
CARO |
| Chapter 05 - Pseudorandom Bits and Sequences.pdf |
206,100 |
PDF |
CARO |
| Chapter 06 - Stream Ciphers.pdf |
274,280 |
PDF |
CARO |
| Chapter 07 - Block Ciphers.pdf |
491,864 |
PDF |
CARO |
| Chapter 08 - Public-Key Encryption.pdf |
303,496 |
PDF |
CARO |
| Chapter 09 - Hash Functions and Data Integrity.pdf |
482,312 |
PDF |
CARO |
| Chapter 10 - Identification and Entity Authentication.pdf |
568,132 |
PDF |
CARO |
| Chapter 11 - Digital Signatures.pdf |
526,851 |
PDF |
CARO |
| Chapter 12 - Key Establishment Protocols.pdf |
400,490 |
PDF |
CARO |
| Chapter 13 - Key Management Techniques.pdf |
340,458 |
PDF |
CARO |
| Chapter 14 - Efficient Implementation.pdf |
371,115 |
PDF |
CARO |
| Chapter 15 - Patents and Standards.pdf |
212,949 |
PDF |
CARO |
| Index.pdf |
160,387 |
PDF |
CARO |
| index.php |
22,274 |
???? |
???? |
| References.pdf |
459,026 |
PDF |
CARO |