First Page | Document Content | |
---|---|---|
Date: 2014-12-25 07:16:38Block cipher Cipher Initialization vector Feistel cipher Cryptographic hash function Key Stream cipher Public-key cryptography Message authentication code Cryptography Key management Symmetric-key algorithm | Chapter Cryptographic Tools and Techniques 1Add to Reading ListSource URL: media.wiley.comDownload Document from Source WebsiteFile Size: 1,59 MBShare Document on Facebook |