Difference between revisions of "CSE539 Applied Cryptography"
From esoterum.org
Line 3: | Line 3: | ||
[http://www.acm.org/classics/sep95/ Ken Thompson's '''On Trusting Trust''', 1984] | [http://www.acm.org/classics/sep95/ Ken Thompson's '''On Trusting Trust''', 1984] | ||
− | === Homework 1: <del>8 February</del> 13 February=== | + | === Homework 1: <del>8 February</del> 13 February === |
*[http://en.wikipedia.org/wiki/Enigma_machine The Enigma Machine] | *[http://en.wikipedia.org/wiki/Enigma_machine The Enigma Machine] | ||
Line 9: | Line 9: | ||
*[http://en.wikipedia.org/wiki/Vigen%C3%A8re_cipher Vigenère cipher] | *[http://en.wikipedia.org/wiki/Vigen%C3%A8re_cipher Vigenère cipher] | ||
+ | |||
+ | === Homework 2: 28 February === |
Revision as of 14:58, 21 February 2007
Good to know
Ken Thompson's On Trusting Trust, 1984