First Page | Document Content | |
---|---|---|
![]() Date: 2008-12-11 22:09:29Substitution cipher Encryption software Advanced Encryption Standard Crypt Encryption Classical cipher Vigenère cipher Cryptography Cipher Caesar cipher | Add to Reading List |
![]() | AE5 Security Notions Definitions Implicit in the CAESAR Call Chanathip Namprempre1 and Phillip Rogaway2 and Tom Shrimpton3 1 Dept. of Electrical and Computer Engineering, Thammasat University, ThailandDocID: 1rsSn - View Document |
![]() | Caesar Shifts Rock 1 by Ucaoimhu The beautiful Rocky Mountain landscapeDocID: 1pSoj - View Document |
![]() | Using Python To Break Basic Ciphers: Hill Climbing Algorithms John HackettDocID: 1gmWZ - View Document |
![]() | CS 161 Computer Security Spring 2010DocID: 1aqux - View Document |
![]() | Permutation Groups and the Solution of German Enigma Cipher Jiˇr´ı Tuma ˚DocID: 1aoNO - View Document |