Difference between revisions of "CSE539 Applied Cryptography"
From esoterum.org
Line 2: | Line 2: | ||
*[http://www.acm.org/classics/sep95/ Ken Thompson's '''On Trusting Trust''', 1984] | *[http://www.acm.org/classics/sep95/ Ken Thompson's '''On Trusting Trust''', 1984] | ||
− | === [http://cactus.eas.asu.edu/Partha/Teaching/539.2007/HW%201.htm Homework 1]: <del>8 February</del> 13 February === | + | === [http://cactus.eas.asu.edu/Partha/Teaching/539.2007/HW%201.htm Homework 1]: <del>8 February</del> 13 February 2007 === |
*[http://en.wikipedia.org/wiki/Enigma_machine The Enigma Machine] | *[http://en.wikipedia.org/wiki/Enigma_machine The Enigma Machine] | ||
:-[http://enigmaco.de/enigma/enigma.html Flash Enigma emulator (Germany)] | :-[http://enigmaco.de/enigma/enigma.html Flash Enigma emulator (Germany)] | ||
*[http://en.wikipedia.org/wiki/Vigen%C3%A8re_cipher Vigenère cipher] | *[http://en.wikipedia.org/wiki/Vigen%C3%A8re_cipher Vigenère cipher] | ||
− | === [http://cactus.eas.asu.edu/Partha/Teaching/539.2007/HW2.htm Homework 2]: 28 February === | + | === [http://cactus.eas.asu.edu/Partha/Teaching/539.2007/HW2.htm Homework 2]: 28 February 2007 === |
*[http://en.wikipedia.org/wiki/SQL_injection SQL injection] | *[http://en.wikipedia.org/wiki/SQL_injection SQL injection] | ||
*[http://www.securiteam.com/securityreviews/5DP0N1P76E.html SQL Injection handbook] | *[http://www.securiteam.com/securityreviews/5DP0N1P76E.html SQL Injection handbook] | ||
*[http://searchsecurity.techtarget.com/tip/1,289483,sid14_gci968714,00.html?track=NL-102&ad=486202 Triple DES and its weaknesses] | *[http://searchsecurity.techtarget.com/tip/1,289483,sid14_gci968714,00.html?track=NL-102&ad=486202 Triple DES and its weaknesses] | ||
− | === [http://cactus.eas.asu.edu/Partha/Teaching/539.2007/Project%201.htm Project 1] === | + | === [http://cactus.eas.asu.edu/Partha/Teaching/539.2007/Project%201.htm Project 1] 31 March 2007 === |