CSE539 Applied Cryptography
From esoterum.org
Revision as of 13:33, 5 March 2007 by
Baker
(
Talk
|
contribs
)
(
diff
)
← Older revision
|
Latest revision
(
diff
) |
Newer revision →
(
diff
)
Jump to:
navigation
,
search
Contents
1
Theory
2
Homework 1: 8 February 13 February
3
Homework 2: 28 February
4
Project 1
Theory
Ken Thompson's
On Trusting Trust
, 1984
Homework 1
:
8 February
13 February
The Enigma Machine
-
Flash Enigma emulator (Germany)
Vigenère cipher
Homework 2
: 28 February
SQL injection
SQL Injection handbook
Triple DES and its weaknesses
Project 1
Navigation menu
Views
Page
Discussion
View source
History
Personal tools
Log in
useful tools
Log in
Main Page
Popular pages
New pages
New files
All pages
Categories
Recent changes
Multi-file upload
reference
References
Coding
Linux
Dictionary
marginally useful tools
Research Log
Random page
Namespace search
Help
Search
Tools
What links here
Related changes
Special pages
Permanent link
Page information