Sold Out
Book Categories |
I | Introduction and Background | 1 |
II | Integrity Concepts | 9 |
III | Recommended Integrity Primitives | 23 |
1 | Introduction to Part III | 25 |
2 | MDC-4 | 31 |
3 | RIPEMD | 69 |
4 | RIPE-MAC | 113 |
5 | IBC-Hash | 145 |
6 | SKID | 169 |
7 | RSA | 179 |
8 | COMSET | 199 |
9 | RSA Key Generation | 213 |
10 | Implementation Guidelines for Arithmetic Computation | 233 |
Login|Complaints|Blog|Games|Digital Media|Souls|Obituary|Contact Us|FAQ
CAN'T FIND WHAT YOU'RE LOOKING FOR? CLICK HERE!!! X
You must be logged in to add to WishlistX
This item is in your Wish ListX
This item is in your CollectionIntegrity Primitives for Secure Information Systems
X
This Item is in Your InventoryIntegrity Primitives for Secure Information Systems
X
You must be logged in to review the productsX
X
X
Add Integrity Primitives for Secure Information Systems, This manual documents the outcome of the EC sponsored project RACE Integrity Primitives Evaluation (R1040), RIPE. This project is a huge joint 350 man-month project conducted by 16 leading European security experts. This book offers expert advice to p, Integrity Primitives for Secure Information Systems to the inventory that you are selling on WonderClubX
X
Add Integrity Primitives for Secure Information Systems, This manual documents the outcome of the EC sponsored project RACE Integrity Primitives Evaluation (R1040), RIPE. This project is a huge joint 350 man-month project conducted by 16 leading European security experts. This book offers expert advice to p, Integrity Primitives for Secure Information Systems to your collection on WonderClub |