Sold Out
Book Categories |
List of figures; Preface; Acknowledgements;
5. Encryption schemes;
6. Digital signatures and message authentication;
7. General cryptographic protocols; Appendix C: corrections and additions to volume I; Bibliography; Index.
Login|Complaints|Blog|Games|Digital Media|Souls|Obituary|Contact Us|FAQ
CAN'T FIND WHAT YOU'RE LOOKING FOR? CLICK HERE!!! X
You must be logged in to add to WishlistX
This item is in your Wish ListX
This item is in your CollectionFoundations of Cryptography: Volume 2, Basic Applications
X
This Item is in Your InventoryFoundations of Cryptography: Volume 2, Basic Applications
X
You must be logged in to review the productsX
X
X
Add Foundations of Cryptography: Volume 2, Basic Applications, Cryptography is concerned with the conceptualization, definition, and construction of computing systems that address security concerns. The design of cryptographic systems must be based on firm foundations. Building on the basic tools presented in the fir, Foundations of Cryptography: Volume 2, Basic Applications to the inventory that you are selling on WonderClubX
X
Add Foundations of Cryptography: Volume 2, Basic Applications, Cryptography is concerned with the conceptualization, definition, and construction of computing systems that address security concerns. The design of cryptographic systems must be based on firm foundations. Building on the basic tools presented in the fir, Foundations of Cryptography: Volume 2, Basic Applications to your collection on WonderClub |