Difference between revisions of "CSE539 Applied Cryptography"

From esoterum.org
Jump to: navigation, search
Line 11: Line 11:
 
*[http://www.securiteam.com/securityreviews/5DP0N1P76E.html SQL Injection handbook]
 
*[http://www.securiteam.com/securityreviews/5DP0N1P76E.html SQL Injection handbook]
 
*[http://searchsecurity.techtarget.com/tip/1,289483,sid14_gci968714,00.html?track=NL-102&ad=486202 Triple DES and its weaknesses]
 
*[http://searchsecurity.techtarget.com/tip/1,289483,sid14_gci968714,00.html?track=NL-102&ad=486202 Triple DES and its weaknesses]
 +
 +
=== [http://cactus.eas.asu.edu/Partha/Teaching/539.2007/Project%201.htm Project 1] ===

Revision as of 13:33, 5 March 2007

Theory

Homework 1: 8 February 13 February

-Flash Enigma emulator (Germany)

Homework 2: 28 February

Project 1